A link to the paper: Difference between revisions
No edit summary |
|||
Line 8: | Line 8: | ||
=The attribution dilemma= | =The attribution dilemma= | ||
==What is the attribution problem== | ==What is the attribution problem== | ||
==Why we need Attribution== | |||
*DoS | |||
==Attribution Attacks== | ==Attribution Attacks== | ||
* Stepping stone attack | * Stepping stone attack |
Revision as of 18:01, 15 March 2011
Title
Requirements for Attribution on the Internet
Abstract
Introduction
The attribution dilemma
What is the attribution problem
Why we need Attribution
- DoS
Attribution Attacks
- Stepping stone attack
- Forgery
- Identity theft
Related Work
2004: This paper uses both link identification and filtering for achieving IP traceback WITHOUT the presence of high network cooperation.