Tcp/ip
Based on your study of the upper layers of the tcp/ip architecture, what are the difficulties in identifying the source of a packet sent over the Internet?
What changes could you make to the architecture so you you would be able to locate the source of the malicious packets?