This thesis builds right method in order to solve three attacking above. All which depend on network addresses gained from the IP header of packets on attacked targets, and accomplish connections of attacking paths, and find the real address of attacker.
英
美
- 针对这三种攻击形式,制定了相应追踪策略,通过被攻击端数据包截获分析得到攻击地址信息,之后在中间设备上运行代理程序完成攻击链路的关联,得到攻击路径上游主机的网络地址,并在判定其是否为攻击源后确定追踪成功或继续回溯攻击路径。