In this way, PIT can find the attackers without any deployment requirement. PIT investigates Internet Control Message Protocol error messages (named path backscatter) triggered by spoofing traffic, and tracks the hackers based on public available information (e.g., topology). This paper proposes passive IP trackback (PIT) that bypasses the deployment difficulties of IP tracers techniques. As a result, the mist on the locations of hackers has never been dissipated till now. However, due to the challenges of deployment, there has been not a widely adopted IP trackback solution, at least at the Internet level. To capture the attackers, a number of IP trackback mechanisms have been proposed. It is long known attackers may use forged source IP address to conceal their real locations.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |