This is archived content, mostly untouched since 2003. For newer
content/updated versions, see
netfuture.ch/Publications.
Notes:
Attacker Q (marked in cyan) can insert fake edges anywhere outside the cyan
border encircling V.
A GOSSIB attack is hard to distinguish from real traceback information. In
fact, we believe that any statistical method that can be applied to
distinguish can be fooled. Even worse, putting in statistical analysis on
the validity of attack edges or fragments will allow the attackers to
remove real attack edges from the victim-reconstructed attack
graph.