期刊文献+

一种在数据链路层上实施的追踪方法

Method for data-link layer traceback
下载PDF
导出
摘要 提出一种数据链路层追踪方法,它对基于哈希的IP追踪技术进行了扩展,在SPIE结构中增加两个组件,将网络层和数据链路层的追踪技术相结合。实验证明,所提出的方法是实用有效的。 This paper proposes a method for data-link layer traceback.It is an extension of Hash-based IP traceback,adds two components in SPIE,and combines traceback technology on network layer and data-link layer.The experiment proves that the new method is effective.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第20期131-134,共4页 Computer Engineering and Applications
基金 湖南省自然科学基金(the Natural Science Foundation of Hunan Province of China under Grant No.05JJ30119)
关键词 边界路由器 基于哈希的IP追踪技术 SPIE 数据链路层 leaf router Hash-based IP traceback Source Path Isolation Engine(SPIE ) data-link layer
  • 相关文献

参考文献14

  • 1Snoeren A C,Partridge C,Sanchez L A,et al.Hash-based IP traceback[C]//Proc ACM SIGCOMM 2001,August 2001.
  • 2Bloom B H.Space/time trade-offs in hash coding with allowable errors[J].Communications of the ACM, 197(), 13(7):422-426.
  • 3Bellovin S M.ICMP traceback messages.Internet Draft:draft-bellovinitrace-00.txt, 2000.
  • 4Savage S,Wetherall D,Karlin A,et al.Practical network support for IP traceback[C]//2000 ACM SIGCOMM Conference,Aug 2000.
  • 5Wang Chun-Hsin,Yu Chang-Wu,Liang Chiu-Kuo,et al.Tracers placement for IP traceback against DDoS attacks[C]//IWCMC'06, Vancouver,British Columbia,Canada,July 3-6,2006.
  • 6梁丰,赵新建,David Yau.通过自适应随机数据包标记实现实时IP回溯(英文)[J].软件学报,2003,14(5):1005-1010. 被引量:22
  • 7Dean D,Franklin M,Stubblefied A.An algebraic approach to IP traceback[J].ACM Transactions on Information and System Security,2002,5(2):119-117.
  • 8Lee Jangwon,de Veciana G.Scalable multicast based filtering and tracing framework for defeating distributed DoS attacks[J].International Journal of Networking Management, 2005,15( 1 ) : 43-60.
  • 9Hazeyama H,OE M,Kadobayashi Y.A layer-2 extension to hashbased IP traceback[J].IEICE Transactions on Information & Systems, 2003,E86-D( 11 ) : 1-9.
  • 10IEEE Std.802.1Q Virtual bridged local area networks[S].2005.

二级参考文献7

  • 1Banga G,Dnlsched P,Mogul J.Resource containers:A new facility for resource management in server system.J In:OSDI ed.Proceedings of the 1999 USENIX/ACM Symposium on Operating System Design and Implementation(OSDI'99).New Orleans,LA:OSDI,1999.45-58.
  • 2Spatscheck O.Peterson L.Defending against denial of service attacks in scout In:OSDI,ed.Proceedings of the 1999 USENIX/ACM Symposium on Operationg System Design and Implementation(OSDI'99)New orleans,LA:OSDI,1999,59-72
  • 3Meadows c.A formal framework and evaluation method for network denial of service In:PCSFW,ed.Proceeding.Of the 1999 IEEE Computer Security Foundations Workshop.Mordano IEEE Compmer Society Press,1999.4-13.
  • 4Savage S,Wetherall D,Karlin A,Anderson T.Practical network support for lP traceback.1n:ACM,ed.Proceedings of the ACM SIGCOMM 2000.Sweden:ACM,2000.295-300.
  • 5Song D,Perrig A.Advanced and authenticated techniques for IP traceback In:INFOCOM,ed.Proceedings of the IEEE INFOCOM 2001.Anchorage:INFOCOM,2001
  • 6Mayeda W.Graph Theory.NewYork:Wiley-Interscience,1972.
  • 7Klamkin M,Newmall D.Extensions of the birthday surprise Journal of Combinatorial Theory,1967.279~282.

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部