Hi all,

My question is quite simple really, is it possible to backtrace a UDP flood attack to its original destination?
I know that the attacker can spoof its IP address, but is it possible to...