DOS attacks under IP Traceback. by Guntaka Fall 2013 CS-555. Outline. Introduction to DOS Attack How does DOS Attack Need for IP Trace back: Evaluation Metrics for IP Trace back Techniques Trace back using ICMP Trace back IP Trace back Limitations Summary . Introduction TO DOS.
Fall 2013 CS-555
Denial of Service
Some security threats affect
Others impact the Integrity of Information...
It is not about Confidentiality or Integrity. It is about:
DoS Agents are installed on the hosts
Handler instructs the DoS Agents
DoS Agents attack the victim networks and hosts
traversing packet, sends packet to destination.