Advertisement

Conclusion

  • Xinyuan Wang
  • Douglas Reeves
Chapter
  • 379 Downloads
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)

Abstract

While traceback and anonymity are important issues in network security, their goals are exactly opposite. Therefore, effective traceback techniques impose challenges in achieving anonymity and vice versa. Recognizing this inherent connection between traceback and anonymity, we have presented recent research results in both traceback and anonymity with emphasis on how they interact with each other.

Keywords

Traceback Inherent Connection Actual Onset Time Inter-packet Time Flow Watermarking 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© The Author(s) 2015

Authors and Affiliations

  • Xinyuan Wang
    • 1
  • Douglas Reeves
    • 2
  1. 1.Department of Computer ScienceGeorge Mason UniversityFairfaxUSA
  2. 2.Department of Computer ScienceNorth Carolina State UniversityRaleighUSA

Personalised recommendations