This thesis builds right method in order to solve three attacking above. All which depend on network addresses gained from the IP header of packets on attacked targets, and accomplish connections of attacking paths, and find the real address of attacker.