Table of Contents

 1     Scope 
 2     References 
 3     Definitions 
        3.1     Terms defined elsewhere 
        3.2     Terms defined in this supplement
 4     Abbreviations 
 5     Conventions 
 6     Traceback introduction 
 7     Possible traceback capabilities in networks 
        7.1     Source identification 
        7.2     Ingress point identification 
        7.3     Partial path identification 
 8     Potential applications of traceback 
        8.1     Application to DDoS attacks 
        8.2     Application to misconfiguration issues 
        8.3     Application to routing issues 
Bibliography