A link to the paper: Difference between revisions

From Soma-notes
Freetonik (talk | contribs)
 
(186 intermediate revisions by 4 users not shown)
Line 1: Line 1:
=Title=
#REDIRECT [[Internet Attribution: Between Privacy and Cruciality]]
Requirements for Attribution on the Internet
 
=Abstract=
 
=Introduction=
 
=The attribution dilemma=
==What is the attribution problem==
==Attribution Attacks==
* Stepping stone attack
* Forgery
** Identity theft
 
=Related Work=
2004: [http://ieeexplore.ieee.org.proxy.library.carleton.ca/stamp/stamp.jsp?tp=&arnumber=1437851 This] paper uses both <i>link identification</i> and <i>filtering</i> for achieving IP traceback WITHOUT the presence of high network cooperation.
 
=Requirements=

Latest revision as of 19:56, 11 April 2011