期刊文献+

一种DDoS攻击追踪策略及应用

A Traceback Tactic of DDoS Attack and Its Application
下载PDF
导出
摘要 目前,为防范DDoS攻击,研究者们提出了多种解决方案,如链路测试法、ICMP追踪法、日志记录法、概率包标记法等,但都需要大量的数据包重构攻击路径。通过分析DDoS攻击的基本原理和目前IP追踪的技术,对一种新的基于哈夫曼编码的IP追踪策略进行了研究,并将此策略应用于局部网络,达到了很好的抵御DDoS攻击的效果。 At present, the researchers have proposed several schemes to keep away DDoS attack, for exampie, Ingress Filtering, ICMP traceback, Logging and Probabilities Packet Marking. But most of these schemes require a large number of packets to conduct the traceback process. This paper makes a study of a new IP traceback tactic using Huffman codes on the basis of the analysis of basic principles of DDoS attack and IP traceback techniques which have been proposed. And the tactic is applied to local network and proves effective in resisting DDoS attack.
出处 《邢台学院学报》 2008年第2期95-98,共4页 Journal of Xingtai University
关键词 DDOS IP追踪 哈夫曼编码 DDoS IP traceback Huffman codes
  • 相关文献

参考文献9

  • 1[1]Yuhei Kawakoya,Yoichi Muraoka.Proposal and implementstion of Router-Based Traceback technique[Z].Proceedings 0f the International Conference on Security and Management.SAM'2004,04,262-266.
  • 2[2]Bao-Tung Wang,Henning Schulzrinne.A Denial-of-service-resistant IP traceback approach[Z].Proceedings of the International Symposium on Computers and Communications,2004,351-356.
  • 3[3]B.Duwairi,A.Chakrabarti,and G.Manimaran.An Efficient Packet Marking Scheme for IP Traceback[c].In Proc.Of Networking 2004,Athens,Greece.
  • 4[4]K.H.Choi and H.K.Dai.A Marking Scheme Using Huffman Codeg for IP Tmceback[z].Proceedings of the 7th International Symposium on Parallel Architectures,Algorithms and Networks(ISPAN'04).2004,421-428.
  • 5[5]Basheer Al-Duwairi and G.Manimaran.A Novel Packet Marking Scheme for IP Traceback[J].Canadian Conference on Electrical and Computer Engineering,2004,4(3):186-190.
  • 6[6]L.Garber.Denim-of-Service Attacks rip the Internet[J].IEEE Computer,2000,33(4):12-17.
  • 7王学飞.DDoS攻击技术的新发展和对策[J].计算机应用与软件,2004,21(5):99-101. 被引量:14
  • 8李德全,徐一丁,苏璞睿,冯登国.IP追踪中的自适应包标记[J].电子学报,2004,32(8):1334-1337. 被引量:33
  • 9李小勇,刘东喜,谷大武,白英彩.DDoS防御与反应技术研究[J].计算机工程与应用,2003,39(12):59-62. 被引量:11

二级参考文献31

  • 1John Howard.An Analysis of Security Incidents on the Intemet[D].Ph D thesis.Carnegie Mellon University,1998.
  • 2Lee Garber.Denial-of-Service Attacks Rip the Intemet[J].IEEE Computer, 2000-04.
  • 3P Ferguson,D Senie.Network Ingress Filtering:Defeating Denial of Service Attacks Which Employ IP Source Spoofing[S].RFC2827,2001.
  • 4Ratul Mahajan,Steven M Bellovin,Sally Floyd et al.Controlling High Bandwidth Aggregates in the Network.2001-02.
  • 5R Stone.CenterTrack:An IP overlay network for tracking DoS Hoods [C].In:Proc 2000 USENIX Security Syrnp,2000.
  • 6H Burch,B Cheswich.Tracing Anonymous Packets to Their Approximate Source[C].In:Proc 2000 USENIX LISA Conf,2000.
  • 7I Postel.Intemet Protocol[S].RFC791,1981.
  • 8Stefan Savage,David Wetherall,Anna Karlin et al.Network Support for IP Traceback[J].IEEE/ACM Transaction on Network,2001-06.
  • 9I Stoiea,H Zhang.Providing Guaranteed Services Without Per Flow Management[C].In:Proceedings of the 1999 ACM SIGCOMM Conference, 1999-08.
  • 10Dawn Xiaodong Song,Adrian Petrig.Advanced and Authticated Marking Schemes for IP Traceack[C].In:IEEE INFOCOM,2001.

共引文献53

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部