The Need for Traceback
Internet hosts are vulnerable
- Many attacks consist of very few packets
- Fraggle, Teardrop, ping-of-death, etc.
Internet Protocol permits anonymity
- Attackers can ėspoofî source address
- IP forwarding maintains no audit trails
Need a separate traceback facility
- For a given packet, find the path to source