期刊文献+

基于流量序列包标记的IP追踪方法

A Method of IP Traceback by Flow Sequence Packet Marking
原文传递
导出
摘要 文章分析了分布式拒绝服务(DDos)攻击的特点和现有的追踪方法,认为对攻击的追踪和辨伪应在网络边界入口和被攻击端进行。根据分布式精确协同较难的特点,提出了一种基于流量序列的包标记法(Flow Sequence Packet Marking,FSPM),用于追踪攻击子网的地址。讨论分析了该方法的算法、有效性、复杂度以及进一步的研究方向。 Based on analyzing the previous methods and characters of DDos, the authors believe that the process of IP traceback should be carried out mainly on the attack ingress and victims. Due to the difficulty precise cooperation in distributed system, a new algorithm scheme called Flow Sequence Packet Marking (FSPM) is proposed, which focuses on the attack ingress. This paper discusses the algorithm, validity, complexity and future research of FSPM.
出处 《通信技术》 2008年第10期73-75,共3页 Communications Technology
关键词 分布式拒绝服务攻击(DDos) IP追踪 流量序列包标记法(FSPM) DDos IP trackback Flow Sequence Packet Marking (FSPM)
  • 相关文献

参考文献6

  • 1Savage S, Wetherall D, Karlin A, et al. Practical network support for IP traceback[J]. ACM SIGCOMM, Computer Communication Review archive Volume 30, Issue 4, 2000:295- 306.
  • 2Aljifri H. IP Trackback: A New Denial-of-Service Deterrent[J]. IEEE SECURITY & PRIVACY MAY/JUNE 2003:24-31.
  • 3Belenky A, Ansari N. IP Traceback With Deterministic Packet Marking[J].IEEE COMMUNCTIONS LETTERS, 2003, 7(04).
  • 4金光,赵杰煜,赵一鸣,王肖虹.还原DoS攻击入口的地址元组标记模型[J].计算机研究与发展,2004,41(7):1117-1123. 被引量:2
  • 5Ramesh S. Improving the Efficiency of IP Traceback at the Dos Victim[DB/OL]. http://www. cs. utah. edu/-sramesh/attachments /ip_traceback.pdf
  • 6Dean D, Franklin M, Stubblefield A. An Algebraic Approach to IP Traceback[J]. ACM Trans. Information and System Security, 2002,5(02):119-137.

二级参考文献14

  • 1H F Lipson.Tracking and tracing cyber-attacks:Technical challenges and global policy issues.CMU/SEI-2002-SR-009.http://www.cert.org,2002-11
  • 2D Moore,G Voelker,S Savage.Inferring Internet denial-of-service activity.The 10th ACM USENIX Security Symposium,Washington D C,2001
  • 3P Ferguson,D Senie.Network ingress filtering:Defeating denial of service attacks which employ IP source address spoofing.RFC 2827,2000
  • 4R Stone.CenterTrack:An IP overlay network for tracking DoS floods.The 9th ACM USENIX Security Symposium,Denver,Colorado,2000
  • 5A Snoeren,C Partridge,L Sanchez,et al.Hash-based IP traceback.ACM SIGCOMM'2001,San Diego,California,2001
  • 6S Bellovin.ICMP traceback messages.The 56th IETF,San Francisco,California,2003
  • 7C Morrow.Blackhole route server and tracking traffic on an IP network.UUNET WorldCom Inc.http://www.secsup.org/Tracking/,2001
  • 8S Savage,D Wetherall,A Karlin,et al.Practical network support for IP traceback.ACM SIGCOMM'2000,Stockholm,Sweden,2000
  • 9D Dean,M Franklin,A Stubblefield.An algebraic approach to IP traceback.ACM Trans on Information and System Security,2002,5(2):119~137
  • 10D Song,A Perrig.Advanced and authenticated marking schemes for IP traceback.IEEE INFOCOM'2001,Anchorage,Alaska,2001

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部