In recent years, to deal with cyber threats, in academic community the traceback is proposed and developed, and a variety of traceback technology is researched. However, the majority of these research focuses on the specific traceability technology and algorithms, and traceback technical framework is lessly done. This articles from two aspects of collaboration domain and non-collaboration domain analysis the traceback technology, to track traceability system proposed non-cooperative domain, design a general traceback technical framework for Internet, which involve various traceback techniques or methods and play all kinds of technology advantages, realize traceback in the global Internet space, improve network security initiative and effectiveness.
2 Savage S, Wetherall D, Karlin A, Anderson T. Practical Network Support for IP Traceback. Department of Computer Science and Engineering University of Washington Seattle, WA, USA,2000.
3 Snoeren AC, Partridge C, Sanchez LA, Jones CE, Tchakountio F, Kent ST, Strayer WT. Hash-Based IP Traceback:BBN Technologies10 Moulton Street, Cambridge, MA 02138,2001.
4 Strayer TW, Jones CE, Tchakountio F, Snoeren AC, Schwartz B, Clements RC, Condell M, Partridge C. Traceback of Single IP Packets Using SPIE, BBN Technologies10 Moulton Street, Cambridge, MA 02138. Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX’03), 2003.
5 Goodrich MT. Efficient Packet Marking for Large-Scale IP Traceback, Department of Info. & Computer Science, University of California, 2002.
6 Belenky A, Ansari N. IP Traceback With Deterministic Packet Marking. IEEE Commun. Lett.,2003,7(4):162-164.
7 Rizvi B, Fermandez-Gaucherand E. Analysis of Adjusted Probabilistic Packet Marking, IEEE, IPOM 2003, 2003,9-13.
8 Kuznetsov V, Simkin A, Sandstrom H. An evaluation of different IP traceback approaches. Department of Computer Science and Electrical Engineering Lulea University of Technology, SE-971 87 Lulea, Sweden, 2003.
9 Cohen D, Narayanaswamy K. Attack Attribution in N- on-Cooperative Networks, 2004.
10 Burch H, Cheswick B. Tracing Anonymous Packets to Their Approximate Source. Proc. of the 14th Conf. Systems Administration, Usenix Assoc.,2000,313-322.
11 Staniford-Chen S, Heberlein LT. Holding Intruders Accountable on the Internet. http://seclab.cs.ucdavis.edu/ papers/thumb.ieee95.pdf. from proceedings of the 1995 IEEE Symposium on Security and Privacy,1995.
12 Zhang Y, Paxson V. Detecting Stepping Stones. http://www.usenix.org/publications/library/proceedings/sec2000/full_papers/zhangstepping/zhangstepping.pdf. 9th USENIX Security Symposium, Denver, Colorado. August 14-17, 2000.