论文部分内容阅读
More and more serious network attack makes it more impending to find out the source of attacker. In thispaper,we analyze the status in development of methods such as ICMP traceback, marking packet, hop by hop, IPsecauthentication and connection chain. We