This paper explores the tracers deployment problem for IP trace- back methods how many and where the tracers should be deployedin the network to be effective for locating the attack origins. Theminimizing the number of tracers deployment problems depended