|
|
(186 intermediate revisions by 4 users not shown) |
Line 1: |
Line 1: |
| =Title=
| | #REDIRECT [[Internet Attribution: Between Privacy and Cruciality]] |
| Requirements for Attribution on the Internet
| |
| | |
| =Abstract=
| |
| | |
| =Introduction=
| |
| | |
| =The attribution dilemma=
| |
| ==What is the attribution problem==
| |
| ==Attribution Attacks==
| |
| * Stepping stone attack
| |
| * Forgery
| |
| ** Identity theft
| |
| | |
| =Related Work=
| |
| 2004: [http://ieeexplore.ieee.org.proxy.library.carleton.ca/stamp/stamp.jsp?tp=&arnumber=1437851 This] paper uses both <i>link identification</i> and <i>filtering</i> for achieving IP traceback WITHOUT the presence of high network cooperation.
| |
| | |
| =Requirements=
| |