1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this supplement
4 Abbreviations and acronyms
5 Conventions
6 Traceback introduction
7 Possible traceback capabilities in networks
7.1 Source identification
7.2 Ingress point identification
7.3 Partial path identification
8 Potential applications of traceback
8.1 Application to DDoS attacks
8.2 Application to misconfiguration issues
8.3 Application to routing issues
Appendix I – Overview of traceback mechanisms research
I.1 Abbreviations and acronyms
I.2 Classification of traceback mechanisms
I.3 IP layer traceback mechanisms
I.4 Comparison of traceback mechanisms
Appendix II – Comparison of traceback mechanisms based on criteria and
taxonomy
Bibliography