期刊文献+

基于自适应包标记的DDoS攻击源的定位研究 被引量:1

Research on locating of DDoS attackers based on adaptive parket marking
下载PDF
导出
摘要 防御分布式拒绝服务攻击是当前网络安全中最难解决的问题之一。在自适应包标记的基础上,提出了有效计算攻击图各个路由器的本地发包率的方法,进一步提出了受害者重构攻击路径和定位攻击源的方法。受害者只要利用收集到的数据包就能更快更准的定位攻击源。 Defending against distributed denial of service attacks is one of the hardest security problems on the Intemet today. Based on the adaptive parket marking scheme, a method is proposed that can effectively compute the local traffic rate of each router in the attack graph. Furthermore, a method is presented which victims can reconstruct the attacking paths and locate the attackers. Victims can locate attackers more quickly and more truly only using the collected packets.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第10期2477-2478,2482,共3页 Computer Engineering and Design
基金 国防基础研究基金项目(A1420061266)
关键词 攻击源定位 IP追踪 拒绝服务攻击 分布式拒绝服务攻击 自适应包标记 attackers locating IPtraceback denial of service attacks distributed denialofserviceattacks adaptive parketmarking
  • 相关文献

参考文献7

  • 1林梅琴,李志蜀,袁小铃,周密,王雪松,童铭.分布式拒绝服务攻击及防范研究[J].计算机应用研究,2006,23(8):136-138. 被引量:11
  • 2谢希仁.计算机网络[M].北京:人民邮电出版社,2002:204-208.
  • 3Stefan Savage,David Wetherall,Anna Karlin, et al.Practical network support for IP traceback[J].ACM SIGCOMM Computer Communication Review,2000,30(4):295-306.
  • 4Law KT, John CS Lui,David KY Yau.You can run, but you can't hide:An effective methodology to traceback DDoS attackers[J]. IEEE Transactions On Parallel and Distributed Systems,2005,16 (9):799-813.
  • 5刘利,苏德富,王国英.基于随机边标记的有效识别攻击源位置的方法[J].计算机工程,2005,31(9):145-147. 被引量:1
  • 6李德全,徐一丁,苏璞睿,冯登国.IP追踪中的自适应包标记[J].电子学报,2004,32(8):1334-1337. 被引量:33
  • 7严蔚敏 吴伟民.数据结构[M].北京:清华大学出版社,1999..

二级参考文献23

  • 1Howard J.An Analysis of Security Incidents on the Internet[PhD Thesis].Carnegie Mellon Univ.,1998-08
  • 2Garber L.Denial-of-Service Attacks Rip the Internet.Computer,2000,33(4): 12-17
  • 3Savage S,Wetherall D,Karlin A,et al.Practical Network Support for IP Traceback,Proc.ACM SIGCOMM 2000,2000-08:295-306
  • 4Song D,Perrig A.Advanced and Authenticated Marking Schemes for IP Traceback.Proc.Infocom 2001,2001-04
  • 5Aljifri H.IP Traceback: A New Denial-of-Service Deterrent?.IEEE Coputer Society,2003
  • 6Belenky A,Ansari N.On IP Traceback.IEEE Communications Magazine,2003-07
  • 7Law K.T,Lui J C S,Yau D K Y.You Can Run,But You Can't Hide: An Effective Methodology to Traceback DDoS Attackers.IEEE Computer Society,2003
  • 8Mahajan R,Bellovin S,Floyd S,et al.Controlling High Bandwidth Aggregates in the Network.Technical Report,ACIRI and AT&T Labs Research,2001-02
  • 9苑森苗.数据结构[M].长春:吉林科学技术出版社[第2版],1995-12..
  • 10K Park,H Lee.On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack[A].Proceedings of IEEE INFOCOM '01[C].Anchorage,Alaska,April,2001.338-347.

共引文献64

同被引文献5

  • 1Savage S.Wetherall D.Anna Karlin,Tom Anderson.Network Support for IP Traceback[J].IEEE/ACM Transaction on Networking,June 2001,9(3):226-237.
  • 2Terence K T Law,John C S Lui.You Can Run,But You Can't Hide:An Effective Statistical Methodology to Trace Back DDoS Attackers[J].IEEE Transactions On Parallel And Distributed System,Sept.2005,16(9):799-813.
  • 3Lazos L,Poovendran R.SeRLoc:secure range independent localization for wireless sensor networks[C]//Proc of the 2004 ACM Workshop on Wireless Security,New York,USA,2004:21-30.
  • 4Cooperative Association for Internet Data Analysis (CAIDA).The Skitter project[EB/OL].[2003-03-05].http://www.caida.org/tools/measurement/skitter/.
  • 5DANIEL C.VoIP技术与应用[M].舒华英译.北京:人民邮电出版社,2003.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部