计算机科学
計算機科學
계산궤과학
COMPUTER SCIENCE
2003年
5期
145-149
,共5页
李毅超%王钰%夏梦芹%曾家智
李毅超%王鈺%夏夢芹%曾傢智
리의초%왕옥%하몽근%증가지
IP traceback%ICMP%IPsec authentication%Connection chain%Hop by hop
More and more serious network attack makes it more impending to find out the source of attacker. In thispaper,we analyze the status in development of methods such as ICMP traceback, marking packet, hop by hop, IPsecauthentication and connection chain. We also put forward the tendency of marked IP traceback.