When attackers must use valid IP source addresses in the probe or exploit packets, how do they conceal their identities?

What will be an ideal response?


Chain attack. Attacks through a chain of victim computers. Final attack computer sends data to attacker. Can’t be traced back more than a few computers.