Because of THE TCP/IP's defects, the attackers can counterfeits the source of the packet to do attacks. In order to prevent the attacks, we have to establish THE IP TRACKING TECHNIQUES to find out the real source of the attackers. Therefore, the way we do in the thesis is to use Gong's Ways as the foundation and simultaneously combine the packet marketing with the packet logging to improve the drawbacks of that every packets that pass through the router should be recorded. Meanwhile, we can reduce the drawbacks that are resulted from constructing. The Attack Way by recording the information those pass through the router. We found that the way we do in the thesis is the single-packet IP tracking way which has lower wrong attack-nodes and storage expenditures.