Unfortunately, mechanisms for dealing with denial-of-service have
not advanced at the same pace. Most work in this area has focused
on tolerating attacks by mitigating their effects on the victim [38,
2, 26, 29, 9]. This approach can provide an effective stop-gap measure,
but does not eliminate the problem nor does it discourage attackers.
The other option, and the focus of this paper, is to trace