In log-based attack tracing
a. routers are configured to log IP packets that they forward.
b. destination hosts are configured to log IP packets that they forward.
c. ICMP packets are configured to log IP packets that they forward.
d. source hosts are configured to log IP packets that they forward.