Abstract: S. Savage et al. presented the approach that require both the victim and Network Admin. As the packet arrive at the Router the packet is marked probablistically with partial path information. “Post-Morton” is performed by the attackers has the coressponding attack has been completed.
Keywords: IP Spoofing, Intruder, IP traceback, Path table, RBI