(Overview of IP Reverse Tracing Techniques As the Internet's predominance in business flows continues to grow, so does network attacks, especially Denial of Service (DoS) attacks. IP hunting techniques enable network administrators of victim hosts to identify the true source of many of the packets that suggest DoS attacks, making it very important to quickly restore normal network functionality, prevent recurring attacks, and ultimately allow attackers to do so. Merely identifying the computers and networks that generate attack traffic may seem like a limited goal, but it provides key clues that help identify actual attackers. This article is used for DoS, and compares and analyzes the basic principles, advantages, failures and limitations of existing IP reverse tracking technologies.)