期刊文献+

使用ns2模拟与改进PPM算法 被引量:1

Simulation and Improvement of Probabilistic Packet Marking Schemes by Means of ns2
下载PDF
导出
摘要 根据推测路径需要的数据包数量、推测复杂性和误报率等参数,对不同的随机包标记(PPM)算法进行了评价.通过扩充ns2、确定攻击拓扑和攻击流量建立一个模拟测试环境,实际模拟并对比分析了各种PPM算法,可测试大规模DDoS攻击下各种PPM算法反向追踪的执行效果.根据模拟过程和结果,提出PPM的改进方向,从而有效提高了反向追踪的实时性. The most promising probabilistic packet marking (PPM) schemes were evaluated based on the basis of the received packet number required for reconstructing the attacking path, computation complexity and false positive etc. We construct a simulation environment via extending ns2, setting attacking topology and traffic, which can be used to evaluate and compare the effectiveness of different PPM schemes. The simulation approach can also be used to test the performing effects of different PPM schemes in large-scale DDoS attacks. Based on the evaluation and simulation results, several improvable aspects of PPM are proposed, which can increase real-time of IP traceback efficiently.
出处 《吉林大学学报(理学版)》 CAS CSCD 北大核心 2005年第6期757-762,共6页 Journal of Jilin University:Science Edition
基金 国家自然科学基金(批准号:90204014)
关键词 IP反向追踪 包标记 评价与模拟 DDOS IP traceback packet marking evaluation and simulation DDoS
  • 相关文献

参考文献17

  • 1Moore D,Voelker G,Savage S.Inferring Internet Denial-of-service Activity [C].Proceedings of 10th USENIX Security Symposium August.Washington:USENIX Association,Berkeley,CA,2001.
  • 2Lee S C,Shields C.Technical,Legal,and Societal Challenges to Automated Attack Traceback [J].IEEE IT Professional,2002,4(3):12-18.
  • 3Mankin A ,Massey D,Wu C L,et al.On Design and Evaluation of Intention-driven ICMP Traceback [C].IEEE International Conference on Computer Communication and Networks (ICCCN'01).[S.1.]:IEEE Press,2001:159.
  • 4Kuznetsov Vadim,Simkin Andrei,Sandstrm Helena.An Evaluation of Different IP Traceback Approaches [C].In:Deng H,ed.Proceeding of the 4th International Conference on Information and Communications Security.New York:Springer,2002:37-48.
  • 5University of Southern California's Information Sciences Institute.The Network Simulator-ns2 [EB/OL],http://www.isi.edu/nsnam/ns,2005.
  • 6Savage S,Wetherall D,Karlin A,et al.Network Support for IP Traceback [J].ACM/IEEE Transactions on Networking,2001,9(3):226-237.
  • 7Park K,Lee H.On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack [C].Proceedings of IEEE INFOCOM '01.Anchorage,Alaska:IEEE Press,2001:338-347.
  • 8Dean D,Franklin M,Stubblefield A.An Algebraic Approach to IP Traceback [J].ACM Trans Information and System Security,2002,5(2):119-137.
  • 9Song Dawn X,Perrig Adrian.Advanced and Authenticated Marking Schemes for IP Traceback [C].Proceedings of IEEE INFOCOM '01.Anchorage,Alaska:IEEE Press,2001:878-886.
  • 10PENG Tao,Leckie Chris,Kotagiri Ramamohanarao.Adjusted Probabilistic Packet Marking for IP Traceback [R].Melbourne,Australia:University of Melbourne,2001.

同被引文献6

  • 1曲海鹏,李德全,苏璞睿,冯登国.一种分块包标记的IP追踪方案[J].计算机研究与发展,2005,42(12):2084-2092. 被引量:9
  • 2Stefan Savage,David Wetherall.Network support for IP traceback[J].IEEE/ACM transactions on networking,2001,9(3):226-237.
  • 3Dawn Xiaodong Song,Adrian Perrig.Advanced and authenticated marking schemes for IP traceback[J].IEEE INFOEOM,2001,13(9),878-886.
  • 4Drew Dean.An algebraic approach to IP traceback[J].ACM transactions on information and systems security,2002,5(2):119-137.
  • 5Zhiqiang Gao,Nlrwan Ansari.Tracing cyber attacks from the pratical perspective[J].IEEE communications magazine,2005,43(5):123-131.
  • 6Gu Hsin Lai,Chia-Mei Chen,et al.Ant-based IP traceback[J].Exert Systems with Applications,2008,34(7):3071-3080.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部