期刊文献+

网络攻击源追踪技术的分类和展望 被引量:15

Classification of network attack source tracing technologies
原文传递
导出
摘要 网络攻击源追踪技术在实时阻断或隔离攻击、追究相关责任、提供法律举证、威慑攻击者等方面具有非常积极的意义。该文对现有的多种网络攻击源追踪技术进行了系统分类,归纳比较了各种方法的优缺点,并探讨了网络攻击源追踪的进一步研究方向,包括建立量化的评估指标体系、建立网络攻击源追踪的理论模型、考虑诸如多播、移动性、IPV6、数据加密、结合管理上的特点解决网络攻击源追踪等问题。 Network attack source tracing plays a key role in stopping on-going attacks, establishing liability, enabling prosecution of attackers, and deterring attackers. This paper classifies some promising traceback approaches and their technical characteristics. Each approach is evaluated in terms of its advantages and disadvantages. Finally, future develops in network attack tracing technologies are discussed including quantitative evaluation metrics, theoretical models, multicast systems, mobility abilities, ipv6 protocol, data encryption, and administration problems.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2005年第4期497-500,共4页 Journal of Tsinghua University(Science and Technology)
基金 国家"九七三"基础研究基金项目(2003CB314805) 中国博士后科学基金项目(20040350027) 广东省自然科学基金资助项目(34308)
关键词 计算机网络安全 网络攻击源追踪 IP源追踪 跨越跳板的追踪 network security network attack tracing IP traceback traceback across stepping-stone
  • 相关文献

参考文献21

  • 1李小勇,刘东喜,谷大武,白英彩.可控网络攻击源追踪技术研究[J].计算机研究与发展,2003,40(6):808-812. 被引量:6
  • 2Dean D, Franklin M, Stubblefield A. An algebraic approach to IP traceback[A]. Proceedings of 2001 Network and Distributed System Security Symposium [C]. California:ACM, 2001.
  • 3Snoeren A C, Partridge C, Sanchez L A, et al. Hash based IP traceback [A]. Proceedings of 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (ACM SIGCOMM) [C].California:ACM, 2001. 3-14.
  • 4Sancbez L A, Milliken W C, Snoeren A C, et al. Hardware support for a hash-based IP traceback [A]. Proceedings ofthe 2nd DARPA Information Survivability Conference and Exposition (DISCEX-Ⅱ) [C]. Anaheim, CA, 2001. 146-152.
  • 5Bellovin S M. ICMP Traceback Messages, Internet Draft[S]. March 2001.
  • 6Mankin A, Massey D, Wu C, et al. On design and evaluation of intention-driven ICMP traceback[A].Proceedings of IEEE 10th International Conference on Computer Communications and Networks (IC3N'2001) [C].Scottsdale, Arizona USA, 2001.
  • 7Staniford-Cben S, Heberlein L T. Holding intruders accountable on the internet [A]. Proceedings of IEEE Symposium on Security and Privacy [C]. Oakland, CA,1995.
  • 8Zhang Y, Paxson V. Detecting stepping stones [A].Proceedings of 9th USENIX Security Symposium [C].Denver, CO, 2000.
  • 9Yoda K, Etoh H. Finding a connection chain for tracing intruders [A]. Proceedings of the 6th European Symposium on Research in Computer Security (LNCS 1985) [C].Toulouse, France, 2000.
  • 10Schnackenberg D, Djabandari K, Sterne D. Infrastructure for intrusion detection and response [A]. Proceedings of DARPA Information Survivability Conference & Exposition(DISCEX '00) [C]. Hilton Head, SC, USA: IEEE, 2000.

二级参考文献1

共引文献5

同被引文献98

引证文献15

二级引证文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部