Next: The RAT Traceback System
Up: RAT User Manual
Previous: Contents
  Contents
On most denial-of-service (DoS) attacks, packets with spoofed source addresses are employed in order to disguise the true origin of the attacker. A defense strategy is to trace attack packets back to their actual source in order to make the attacker accountable and isolate him from the network. To date, the proposed traceback systems require either large amounts of storage space on router-connected devices or a sufficient number of received attack packets. The RAT system is capable of determining the source of every packet received by the victim without storing state in the network infrastructure.
Subsections
Grupo de Teleinformática e Automação (GTA/UFRJ)