A link to the paper: Difference between revisions
AbdelRahman (talk | contribs) No edit summary |
|||
Line 11: | Line 11: | ||
* Stepping stone attack | * Stepping stone attack | ||
* Forgery | * Forgery | ||
** Identity theft | |||
=Related Work= | =Related Work= |
Revision as of 17:58, 15 March 2011
Title
Requirements for Attribution on the Internet
Abstract
Introduction
The attribution dilemma
What is the attribution problem
Attribution Attacks
- Stepping stone attack
- Forgery
- Identity theft
Related Work
2004: This paper uses both link identification and filtering for achieving IP traceback WITHOUT the presence of high network cooperation.