Abstract: S. Savage et al. presented the approach that require both the victim and Network Admin[10]. As the packet arrive at the Router the packet is marked probablistically with partial path information. “Post-Morton” is performed by the attackers has the coressponding attack has been completed.

Keywords: IP Spoofing, Intruder, IP traceback, Path table, RBI