期刊文献+

基于路由器的ICMP流量异常检测 被引量:1

ICMP Traffic Anomaly Detection Based on Router
下载PDF
导出
摘要 针对使用ICMP(Internet ControlM essage Protocol)协议的网络病毒对网络性能影响日益严重的问题,利用路由器所处网络位置的优势,对流经路由器的ICMP数据包进行分析、统计,从中找出感染病毒主机的IP地址,并对其进行相应处理。经过实际应用结果表明,使用该方法可较为彻底地杜绝网络中ICMP数据包的大量泛滥,从而提高了网络的有效传输带宽。 According to the network virus that uses ICMP (Internet Control Message Protocol) protocol, the problem of increasingly serious influence for network performance uses the advantage of router. For analysing and making statistics the ICMP packets through router, find out the host's IP address that infected virus, and then carries out suitable handling. Pass a time of application, the result show that use this kind of method, it can prevent the ICMP pockets'overflows in large quantities in network thoroughly and enhance effective transmission bandwidth of the network.
出处 《吉林大学学报(信息科学版)》 CAS 2006年第3期341-344,共4页 Journal of Jilin University(Information Science Edition)
基金 吉林大学创新基金资助项目(2003CX041)
关键词 网络病毒 路由器 因特网控制消息协议 数据包 扫描 network virus router internet control message protocol (ICMP) packets scan
  • 相关文献

参考文献12

  • 1WEAVER N.Potential Strategies for High Speed Active Worms [EB/OL].[2001-07].http://www.cs.berkeley.edu/~ nweaver/worms.pdf.
  • 2Eeye Digital Security.Code Red Worm [ EB/OL].[2001-07].http://www.eeye.com/html/Research/Advisories/AL20010717.html.
  • 3EEYE DIGITAL SECURITY.Blaster Worm Analysis [ EB/OL ].[ 2003-03 ].http://www.eeye.com/html/Research/Advisories/AL20030811.html.
  • 4CERT.Code Red Ⅱ:Another Worm Exploiting Buffer Overflow in ⅡS Indexing Service DLL [ EB/OL].[ 2001-09 ].http://www.cert.org/incident_notes/in-2001-09.html.
  • 5WEAVER N.Warhol Worms:The Potential For Very Fast Internet Plagues [ EB/OL].[ 2001-09 ].http://www.cs.berkeley.edu/~nweaver/warhol.html.
  • 6文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 7贾学东,陈喆,张晓艳,孟健.新型网络蠕虫特征分析及防御策略[J].信息工程大学学报,2004,5(3):42-45. 被引量:6
  • 8李文雄,刘辉,陈东阳.边界路由器安全技术研究[J].计算机工程,2000,26(8):144-145. 被引量:6
  • 9云晓春,方滨兴.网络病毒主动预警模型[J].通信学报,2002,23(5):103-107. 被引量:9
  • 10杨可新,鞠九滨,胡亮.降低Web安全扫描误判率[J].吉林大学学报(信息科学版),2004,22(3):252-255. 被引量:2

二级参考文献37

  • 1何建辉.实用Visual C++6.0教程[M].北京:清华大学出版社,2000..
  • 2[1]LINGER R C,MEAD N R,Lipson H F.Requirements definition for survivable network systems[A].Requrements Engineering'98[C].Colorado,April 1998.14-23.
  • 3[2]Understanding symantec's anti-virus strategy for internet gateways[EB/OL].http://www.symantec.com/avcenter/reference/wpnavieg.pdf,1999-09.
  • 4[3]COHEN F.Computer viruses: theory and experiments[J].Computers & Security,1987,6(2):22-35.
  • 5[4]ALLEN J,CHRISTIE A.State of the practice of intrusion detection technologies[R].CMU/SEI-99-TR-028,Carnegie Mellon University:Software Engineering Institute,2000.
  • 6[5]STEVENS W R.TCP/IP Illustrated,Volume 1:the Protocols[M].USA:Addison Wesley,1994.
  • 7[4]Jung J, Krishnamurthy B, Rabinovich M. Flash crowds and denial of service attacks: Characterization and implications for cdns and web sites[A]. ACM[C], 2002.
  • 8[5]Peng T,Leckie C, Ramamohanarao K. Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring[EB/OL]. http://www.ee.mu.oz.au/pgrad/taop/research/detection.pdf,2002-11.
  • 9[6]Wang HN, Zhang D, Shin KG. Detecting SYN Flooding Attacks[A]. INFOCOM[C], 2002.
  • 10[7]Basseville M, Nikiforov IV. Detection of Abrupt Changes : Theory and Application[M]. Prentice Hall, 1993.

共引文献210

同被引文献9

  • 1REKHTER Y,LI T.RFC 1771 (1995):A Border Gateway Protocol (BGP Version 4)[S].
  • 2STEWART J W.BGP4 (1998),Inter-Domain Routing in the Internet[S].
  • 3MAHAJAN R,WETHERALL D,ANDERSON T.Understanding BGP Misconfiguration[J].Proc ACM SIGCOM,2002,32(4):3-16.
  • 4MISELS A WOW.AS7007.NANOG Mail Archives[EB/OL].(2006-12-20).http://www.merit.edu/mail.archives/nanog/1977 -04.html.
  • 5FARRAR J.C & W Routing Instability,NANOG Mail Archives[EB/OL].(2005-03-20).http://www.merit.edu/mail.archives/nanog.
  • 6KENT S,LYNN C,SEO K.Secure Border Gateway Protocol (Secure-BGP)[J].IEEE Journal on Selected Areas in Communication,2000,18 (4):582-592.
  • 7HUSTON G.Interconnection,Peering and Settlements[EB/OL].(2007-3-20).http://www.potaroo.net/papers/1999-6-peer/peering.pdf.
  • 8VARADHAN K,GOVINDAN R,ESTRIN D.Persistent Routes Oscillations in Inter-Domain Routing[J].Computer Networks,2000,32 (1):1-16.
  • 9MANNING B.Documenting Special Use Ipv4 Address Blocks that Have Been Registered with IANA[EB/OL].(2007-03-20).http://www.isi.edu/~bmanning/dsua.html.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部