期刊文献+

认证确定包标记算法

Authenticated Deterministic Packet Marking Scheme
下载PDF
导出
摘要 确定包标记算法只需要边界路由器进行标记,可以对只使用少量包的拒绝服务攻击进行追踪,能同时追踪上千个攻击者,并且易于实现.针对确定包标记算法中,被攻击者控制的路由器(边界路由器或中间路由器)修改标记或加入伪造包,进而妨碍受害者重构入口地址的问题,提出了新的基于MAC认证的确定包标记算法.研究表明,认证确定包标记算法提供了足够的安全性,能有效阻止子网内的攻击者或傀儡路由器伪造虚假的标记,从而保证了受害者端地址重构的准确性. Deterministic packet marking (DPM) algorithm only requires edge routers to perform packet marking and can trace a large number of attackers simultaneously with only a few packets from each attacker. For that, compromised routers, either edge routers or transit routers, can easily forge packet markings to prevent the victim performing reconstruction successfully. For that, a new scheme, namely MAC - based Authenticated DPM ( ADPM ), is pro- posed. Researches indicate that ADPM algorithm supplies sufficient security that attackers in subnets or compromised routers cannot forge markings, which assures the veracity of address reconstruction at the victim.
出处 《南京师范大学学报(工程技术版)》 CAS 2007年第2期67-71,共5页 Journal of Nanjing Normal University(Engineering and Technology Edition)
基金 江苏省高校自然科学基金(04KJD520106)资助项目
关键词 拒绝服务攻击 IP追踪 确定包标记 基于MAC的认证 denial of service attack, IP traceback, deterministic packet marking, MAC - based authentication
  • 相关文献

参考文献13

  • 1[1]Ferguson Paul,Senie Daniel.RFC 2827:Network ingress filtering:Defeating denial of service attacks which employ IP source address spoofing[EB/OL].[2006-09-15].http://www.ietf.org/rfc/rfc2827.txt.may 2000.
  • 2[2]Burch Hal,Cheswick Bill.Tracing anonymous packets to their approximate source[C]//USENIX LISA.New Orleans:Rémy Evard,2000:319-327.
  • 3[3]Stone Robert.Centertrack:An ip overlay network for tracking dos floods[C]//9th USENIX Security Symposium.Denver,Colorado:Steven Bellovin,2000:199-212.
  • 4[4]Sager Glenn.Security fun with ocxmon and cflowd[R/OL].[2006-09-15].Presentation at the Internet 2 Working Group,1998.http://www.caida.org/.projects/NGI/content/security/1198.
  • 5[5]Bellovin Steve.The icmp traceback message:draft-bellovin-itrace-00.txt[EB/OL].[2006-09-15].http://www.cs.columbia.edu/~smb/papers/draft-bellovin-itrace-00.txt.
  • 6[6]Savage Stefan,Wetherall David,Karlin Anna,et.al.Network support for IP traceback[J].IEEE/ACM Transactions on Networking,2001,9(3):226-237.
  • 7[7]Song Dawn,Perrig Adrian.Advanced and authenticated marking schemes for IP traceback[C]//IEEE INFOCOM '01.Anchorage,Alaska:Bhaskar Sengupta,2001:878-886.
  • 8[8]Belenky Andrey,Ansari Nirwan.IP traceback with deterministic packet marking[J].IEEE Communications Letters,2003,7(4):162-164.
  • 9[9]Belenky Andrey,Ansari Nirwan.Tracing Multiple Attackers with Deterministic Packet Marking(DPM)[C]//IEEE PACRIM'03.Victoria,Canada:Fayez Gebali,2003:49-52.
  • 10[10]Belenky Andrey,Ansari Nirwan.Accommodating fragmentation in deterministic packet marking for IP traceback[C]//IEEE GLOBECOM'03.San Francisco,USA:Terry E F Kero,2003:1374-1378.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部