期刊文献+

基于AS协同的分布式拒绝服务攻击追踪机制研究 被引量:1

RESEARCH ON AS COLLABORATING BASED TRACEBACKING MECHANISM OF DISTRIBUTED DENIAL-OF-SERVICE(DDoS) ATTACK
下载PDF
导出
摘要 提出一种基于自治系统协同的分布式拒绝服务攻击的追踪算法。在该算法中,自治系统边界路由器把所在的AS信息以一定的概率对经过的数据包进行标记,受害者可通过数据包中所标记的路径信息重构出攻击路径,从而追踪到攻击源。带认证的标记方法有效地防止了攻击者伪造和篡改数据包中的路径信息。与其它追踪算法相比,该算法实现了快速实时追踪攻击源,有效地抑制了攻击流进入其它的网络,及时缓减了攻击带来的影响。 An Autonomous System(AS) Collaborating based tracebacking algorithm for disposing Distributed Denial-of-Service(DDoS) attack is proposed. In this algorithm, border routers of AS mark the forwarded packets with the path information of current AS in certain probability. The victim thus can reconstruct the attack path to trace the attack source according to the marked information. By the authenticated marking method, attackers can be effectively prevented from forging and sophisticating the path information in the head of packets. In contrast to other tracebacking algorithms, this algorithm manages to real-timely traceback the attack source and efficiently hold the attack flow from entering other networks. Hence it alleviates the impact caused by the attack in time.
作者 李刚 华蓓
出处 《计算机应用与软件》 CSCD 北大核心 2007年第10期184-187,共4页 Computer Applications and Software
基金 安徽省自然科学基金(03042211)的资助。
关键词 自治系统 分布式拒绝服务 概率标记 Autonomous system Distributed denial-of-service Probabilistic marking
  • 相关文献

参考文献9

  • 1Ferguson P,Senie D.RFC2827,Network Ingress Filtering:Defeating Denial of Service Attacks which employ IP Source Address Spoofing.May 2000.
  • 2Stefan Savage,et al.Practical Network Support for IP Traceback.In:Proceedings of the 2000 ACM SIGCOMM Conference,Stockholm,Sweden,August 2000:295-306.
  • 3Dawn Xiadong Song,Adrian Perring.Advaced and Authenticated Marking Schemes for IP trace back,IEEE INFOCOM,2001.
  • 4Hal Burch,Bill Cheswic.Tracing Anonymous Packets to Their Approximate Sourece.Usenix LISA,December 3-8,New Orleans,2000:313-321.
  • 5Stoica I,Zhang H.Providing Guaranteed Services Without Per Flow Mangement[C].In Proceedings of the 1999 ACM SIGCOMN Conference,81-89,MA,Aug.1999.
  • 6Fayed M,Krapivsky P,et al.On the Size Distribution of Autonomous Systems.Technical Report,Boston University,Jan2003.
  • 7Magoni D,Pansiot.Analysis of the Autonomous Systems Network Topology.ACM Computer Communication Review,2001,31(3):26-37.
  • 8peng T,Leckie C,Kotagiri R.Adjusted Probabilicstic Packet making[C].In Proceeding of the Second IFIP Networking Conference,May 2002.
  • 9Stefan Savage,David Wetherall,Anna Karlin,Tom Anderson.Pactical Support for IP Traceback,Prceedings of the 2000 ACM SIGCOMM Conference,2000.

同被引文献7

  • 1Astha Keshariya, Noria Foukia. DDoS Defense Mechanisms: A New Taxonomy [ J]. Computer Science, 2010,59 ( 39 ) : 222 -236.
  • 2Munivara Prasad K, Rama Mohan Reddy A. IP Traceback for Flooding attacks on Internet Threat Monitors Using Hondypots [ J]. International Journal of Network Security&Its Application, 2012,4( 1 ) : 13-27.
  • 3Igor Kotenko. Agent-based Simulation of Cooperative Defence Against Botnets [ J]. Concurrency and Computation Practive and Experience, 2012,24 ( 5 ) :573-588.
  • 4Igor Kotenko, Alexey Konovalov. Agend-based Modeling and Simuation of Botnets and Botnet Defense[ C]//Conference on Cyber Conflict Proceedings. 2010:21-43.
  • 5Igor Kotenko, Alexander. Multi-agent modeling and simulation of agents' competition for network resources availability[ C ]// Ulanov. Fourth International Conference on Autonomous Agents and Multi-Agent Systems. 2009:27-43.
  • 6黄忠厚,徐川,刘宴兵.DDoS攻击源追踪算法综述[J].计算机应用研究,2010,27(9):3233-3236. 被引量:2
  • 7蒋勇.DDoS攻击的IP追踪技术分析与比较研究[J].计算机安全,2010(12):59-62. 被引量:2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部