GATES INSTITUTE OF TECHNOLOGY
Computer network attacks are on the increase and are more sophisticated in today's network environment than ever before. One step in tackling the increasing spate of attacks is the availability of a system that can trace attack packets back to their original sources irrespective of invalid or manipulated source addresses. Most of these schemes require very large number of packets to conduct the traceback process, which results in lengthy and complicated procedure. IP traceback is just the technique to realize the goal, it reconstructs IP packets traversed path in the Internet to determine their origins. To reconstruct the path of a packet and identify the source of the attack, the victim requires a map of the routers.