Deployment
We solicit a variety of requirements and case studies for wider deployment of traceback techniques in general. Topics include, but not limited to:
- ICMP traceback, IP-option traceback and hash-based traceback mechanisms.
- MPLS-based traceback (as in CenterTrack).
- Requirements for attack mitigation.
- Requirements for the investigation of attack source.
- Other approaches to improve source-address accountability in general, e.g., RPF checks, ingress filtering and BGP-based mechanisms.
last update: $Id: deployment.html,v 1.4 2003/04/19 16:15:53 haze Exp $ +9hours
|