期刊文献+

基于神经网络的主动IP回溯

IP traceback based on NNT
下载PDF
导出
摘要 计算机通信网络的安全防护体系是一个动态的,基于时间变化的概念。在伪造及攻击手段层出不穷的情况下,为了取得最新的攻击技术的资料,得到入侵者攻击系统的证据,追查攻击的真正来源,将神经网络与陷阱技术相结合,提出了一种新的基于神经网络的主动IP源回溯方案,并分析了这一方案的实现流程及算法实现。与现有回溯技术比较,具有很低的网络和路由开销,较低的路由错选和漏报率,得到了满意的结果。 The security system of computer communication network should be dynamic and different according to the times. While the forgery and attack technique emerge endlessly, in order to gain the evidence and the genuine IP address of the attacks, a honeynet with NNT based IP initiative Traceback technique is firstly presented. The implement flow and arithmetic simulation program are also given. Comparing with the other IP Traceback solutions, the rate of fail report, the wrong router selection, the costs of the router and network of this technique are lower. The obtained results are efficient and satisfactory.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第17期4105-4107,共3页 Computer Engineering and Design
关键词 计算机网络 IP回溯 陷阱网络 网络安全 神经网络 computer network IP Traceback honeynet network security NNT
  • 相关文献

参考文献8

  • 1陆庆,周世杰.基于边采样包标记的IP源回溯系统[J].计算机应用,2003,23(3):21-23. 被引量:1
  • 2董玲,陈一民.使用带认证的入口包标记追踪IP源地址[J].计算机工程与科学,2004,26(4):11-14. 被引量:1
  • 3Stefan Savage,David Wetherall,Anna Karlin,et al.Practical network support for IP traceback[J].IEEE/ACM Transaction on Networking,2001,9(3):226-237.
  • 4Kihong Park,Heejo Lee.On the effectiveness of route-based packet filtering for distributed DOS attack prevention in power-law internets[J].Computer Communication Review,2001,31 (4):15-26.
  • 5刘宝旭,许榕生.主动型安全防护措施-陷阱网络的研究与设计[J].计算机工程,2002,28(12):9-11. 被引量:24
  • 6Drew Dean,Adam Stubblefield.An algebraic approach to IP traceback[J].ACM Transactions on Information and System Security,2002,5(2):119-137.
  • 7Lance Spitzner.The Honeynet project:Trapping the Hackers[J].IEEE Security and Privacy,2003,1 (2):15-23.
  • 8Alex C Snoeren,Craig Partridge.Hash-based IP traceback[J].Computer Communication Review,2001,31 (4):3-14.

二级参考文献16

  • 1[3]Cisco. Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks[EB/OL]. http://www.cisco.com, 2000-02-17.
  • 2[4]Bellovin SM. ICMP Traceback Messages[R]. AT&T Labs Research,2000.
  • 3[5]Savage S, Wetherall D,Karlin A, et al. Practical network support for ip traceback[A]. Proceedings of the 2000 ACM SIGCOMM Conference[C], 2000.
  • 4[6]Song DX, Perrig A. Advanced and Authenticated Marking Schemes for IP Traceback[A]. IEEE forum[C],2001.
  • 5[7]Peng T, Leckie C, Kotagiri R. Adjusted Probabilistic Packet Marking for IP Traceback [A]. LNCS 2345[C], 2002. 697.
  • 6[8]Rivest RL. The MD5 Message Digest Algorithm[S]. RFC 1321, April 1992.
  • 7[1]Cisco Systems. Configuring tcp intercept (prevent denial-of-service attacks)[Z]. Cisco IOS Documentation, 1997.
  • 8[2]Internet mapping[EB/OL]. http://cm.bell-labs.com/who/ches/map/dbs/index.html, 1999.
  • 9[1]Stefan Savage,David Wetherall,Anna Karlin,et al. Network Supportfor IP Traceback[J].IEEE/ACM Trans on Networking, 2001, 9(3):226-237.
  • 10[2]P Ferguson, D Senie. Network Ingress Filtering: Defeating Denial-of-Service Attacks Which Employ IP Source Address Spoofing[S]. RFC 2827, 2000.

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部