Question: 3. [10 points] Suppose routers in the network shown below have been configured to implement the IP Traceback scheme, where each router tags itself
3. [10 points] Suppose routers in the network shown below have been configured to implement the IP Traceback scheme, where each router tags itself with 30% probability. In the scenario shown, the bottom node is a target for a DDoS attack. You can assume the routing algorithms have set up routing tables for the shortest paths. Bot Bot B * target G Bot C A (+*+ ....... a) What will be the probability that the victim can determine the gateway or next hop router of Node C? Briefly explain your findings and implications. b) Grad students or UG students for bonus: If Node C is using a spoofed IP address, will the IP Traceback be useful in any way? Briefly explain why or why not.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
