Skip to main content

Table 1 The differences between valid and invalid networks

From: IP traceback through (authenticated) deterministic flow marking: an empirical evaluation

Network type

Sending legitimate flows

Sending attack flows

Valid

Destination is able to identify the origin of traffic

If an attacker spoofs its source IP address, the destination (victim)

  

cannot identify the origin of the attack traffic

Invalid

Destination cannot identify the origin of traffic

The destination (victim) cannot identify the origin of the attack traffic