Original live talk shows. Live broadcasting and podcasting of  talk radio programs and video shows.
Live Talk Radio Main Station ScheduleBecome A Talk Show HostNew Indie MusicBe A Talk Show Guest

Trusted News Trader
© Where truth comes into play
Trying to identify online saboteurs: The IP Traceback Problem.

IP traceback


Trace-back of active attack flows

In this type of solution, an observer tracks an existing attack flow by examining incoming and outgoing ports on routers starting from the host under attack. Thus, such a solution requires having privileged access to routers along the attack path.

To bypass this restriction and automate this process, Stone proposes routing suspicious packets on an overlay network using ISP edge routers. By simplifying the topology, suspicious packets can easily be re-routed to a specialized network for further analysis.

This is an interesting approach. By nature of DoS, any such attack will be sufficiently long lived for tracking in such a fashion to be possible. Layer-three topology changes, while hard to mask to a determined attacker, have the possibility of alleviating the DoS until the routing change is discovered and subsequently adapted to. Once the attacker has adapted, the re-routing scheme can once again adapt and re-route; causing an oscillation in the DoS attack; granting some ability to absorb the impact of such an attack.

Uni Utah PDF IP Traceback

Uni LA PDF Single Package tracking

more links for PDFs

Forensic Approach


after each PDF download my browser was crashed and had to be restarted,
monkeys at work?

Messages In This Thread

ADMIN! Since this forum keeps getting hammered with DOS attacks and more..... sensitive info will now also show up on the index page of BBS Radio! *PIC*
ADMIN! ALSO, we are within 30 days of launching our new FULL ON News Forum (somewhat like WRH), with comments and videos, etc. And it will be very hard to crash and very informative :) All this for you!
Thank You for your Patience & Hard Work... :) *NM*
ADMIN! Thank you. *NM*
DoS - Malicious 'Denial of Service' Attack - explained for Dummies, Geeks and Freaks.
Securing against DDoS 'Distributed Denial of Service' attacks.
Trying to identify online saboteurs: The IP Traceback Problem.
Fair Use Notice -- Terms of Usage

Host Your Own Talk Show on BBS Radio
©2005-2020 BBS Network, Inc. | BBS Radio® | BBS Talk Radio™ | BBS® ALL RIGHTS RESERVED - If it's not mainstream it's on BBS Radio. We do talk shows right!