next up previous contents
Next: The RAT Traceback System Up: RAT User Manual Previous: Contents   Contents

Introduction

On most denial-of-service (DoS) attacks, packets with spoofed source addresses are employed in order to disguise the true origin of the attacker. A defense strategy is to trace attack packets back to their actual source in order to make the attacker accountable and isolate him from the network. To date, the proposed traceback systems require either large amounts of storage space on router-connected devices or a sufficient number of received attack packets. The RAT system is capable of determining the source of every packet received by the victim without storing state in the network infrastructure.



Subsections

Grupo de Teleinformática e Automação (GTA/UFRJ)