Author(s): B. Sai Priyanka; N. Srihari Rao
Since many years Internet has been used broadly in several fields, network security problems are the major concern. A literature survey is carried out in this context to explore different IP Traceback techniques. This paper presents several techniques to perform IP Traceback. The pros and cons of each technique are explained briefly in this paper.