Table of Contents

 1     Scope          
 2     References
 3     Definitions 
        3.1     Terms defined elsewhere        
        3.2     Terms defined in this supplement        
 4     Abbreviations and acronyms             
 5     Conventions             
 6     Traceback introduction        
 7     Possible traceback capabilities in networks 
        7.1     Source identification  
        7.2     Ingress point identification      
        7.3     Partial path identification         
 8     Potential applications of traceback 
        8.1     Application to DDoS attacks     
        8.2     Application to misconfiguration issues
        8.3     Application to routing issues   
Appendix I – Overview of traceback mechanisms research    
        I.1     Abbreviations and acronyms   
        I.2     Classification of traceback mechanisms               
        I.3     IP layer traceback mechanisms               
        I.4     Comparison of traceback mechanisms
Appendix II – Comparison of traceback mechanisms based on criteria and taxonomy    
Bibliography