期刊文献+

基于Backscatter技术的假冒源地址攻击研究

A Backscatter Technology Based Study on Source Address Spoofing
下载PDF
导出
摘要 假冒源地址攻击具有容易实施不易被追溯的特点,这种攻击行为在互联网上日益猖獗。网络安全正面临着前所未有的挑战,对假冒源地址攻击的研究是一项重要课题。文中概述假冒源地址攻击的主要特征;阐释Backscatter技术和ICMP协议的工作原理;从宏观和微观2个视角,研究CAIDA网络Telescopes工程所捕获PCAP流量的最新数据。借助于数据挖掘和统计分析技术,从PCAP流量数据中得到ICMP报文,并对所得报文跟踪分析了假冒源地址攻击信息。经过统计汇总,得出假冒源地址攻击所对应主要类型,并对集中度高的几种做了深入研究,通过对这些攻击类型的详细分析,探索了最新DoS/DDoS中假冒源地址攻击方式及其危害。最后总结全文并展望下一步研究工作。 Source address spoofing has become a widely used mechanism to achieve attack because it is easy to launch and difficult to detect and trace.Source address spoofing attacks pose a significant threat to the Internet today.Network security is facing a severe challenge we have never met before.It is an important task to research source address spoofing attacks.This paper surveys the definition of source address spoofing attacks,explains the principles of Backscatter and ICMP techniques,and analyzes the newest B...
出处 《中国海洋大学学报(自然科学版)》 CAS CSCD 北大核心 2008年第S1期125-128,共4页 Periodical of Ocean University of China
基金 国家科技支撑计划重大课题"新一代互联网真实地址关键技术"资助
关键词 假冒源地址 Backscatter技术 假冒源地址攻击分析 source address spoofing Backscatter technology source address spoofing attacks analysis
  • 相关文献

参考文献10

  • 1Computer Emergency Response Team(CERT).TCP SYN floodingand IP spoofing attacks[OL]. http://www.cert.org/advisories/CA-1996-21.html . 2000
  • 2Computer Emergency Response Team(CERT).Smurf IP Denial-of-Service Attacks[OL]. http://www.cert.org/advisories/CA-1998-01.html . 2000
  • 3Moore D,Shannon C,Brown D,et al.Inferring internet denial-of-service activity[].IEEE/ACM Transactions on Computer System(TOCS).2006
  • 4Moore D,Shannon C,Voelker G M,et al.Network telescopes[].CAIDA TechRep.2003
  • 5Francois J,State R,Festor O.Tracking global wide configuration er-rors[].IEEE/IST Workshop on MonitoringAttack Detection andMitigation.2006
  • 6Shannon C,Moore D,Aben E.The CAIDA Backscatter-2008Dataset-2008-05[OL]. http://www.caida.org/data/passive/backscatter 2008 dataset.xml .
  • 7Eddy W.Defenses Against TCP SYN Flooding Attacks[].The In-ternet Protocol Journal.2006
  • 8Chen W,Yeung D Y.Defending against TCP SYN flooding attacksunder different types of IP spoofing[].ICN/ICONS/MCL.2006
  • 9Postel J.Internet control message protocol,DARPA Internet pro-gram protocol specification[OL][].RFC.1981
  • 10.Tcpipguide[OL][]..

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部