요약
ABSTRACT
1. Introduction
2. Trace-back Techniques
2.1 TCP connection Trace-back
2.2 IP packet trace-back
3. TCP Session Hijacking
4. TCP Hijacking trace-backscheme using packet marking
4.1 Packet Water-Marking Trace-back
4.2 TCP Hijacking trace-back schemeusing packet marking
5. Conclusion
Reference