From: IP traceback through (authenticated) deterministic flow marking: an empirical evaluation
Network type | Sending legitimate flows | Sending attack flows |
---|---|---|
Valid | Destination is able to identify the origin of traffic | If an attacker spoofs its source IP address, the destination (victim) |
 |  | cannot identify the origin of the attack traffic |
Invalid | Destination cannot identify the origin of traffic | The destination (victim) cannot identify the origin of the attack traffic |