摘要 |
PROBLEM TO BE SOLVED: To track the transmission source of an attack when a service is interfered and attacked while suppressing the consumption of network resources at a regular time. SOLUTION: Even while a client device 10 receives service interference and attach from an attacker device 40 through each of router devices 20<SB>1</SB>to 20<SB>5</SB>, the client device 10 requests a router device 20<SB>i</SB>to track the attacker device 40, discriminates a router device 20<SB>i+1</SB>closer to the transmission source on the basis of the results of the tracking request and hereinafter similarly and repeatingly requests a router device 20<SB>i+1</SB>,... to track the attacker device 40 and discriminates a router device 20<SB>i+2</SB>,... closer to the attacker device 40, thereby tracking the transmission source. This can realize efficient track processing even when the service is interfered and attacked. COPYRIGHT: (C)2003,JPO
|