期刊文献+

基于概率的保持前缀地址随机化算法的安全评估

Probability Analysis Based Prefix Preserving IP Address Anonymization Scheme Security Evaluation
原文传递
导出
摘要 地址随机化算法通常用于在发布流量数据之前进行去隐私处理.保持前缀地址随机化算法就是其中一个常用算法.对于保持前缀地址随机化算法而言,由于引入了更多的限制,因此也面临更多的安全风险.分析了相关性攻击对保持前缀地址随机化算法的安全影响,并利用概率分析和仿真评估了不同攻击方法对其安全性能的影响. IP address anonymization scheme is often used to avoid privacy issues before traffic distribution. Prefix preserving IP address anonymization scheme is one of the most frequently used schemes. For prefix preserving IP address anonymization scheme, more security threats are introduced because of more correlations, In this paper the correlation based security attacks are evaluated and different attack methods are studied with the probability model and simulation.
出处 《数学的实践与认识》 CSCD 北大核心 2009年第1期154-159,共6页 Mathematics in Practice and Theory
基金 国家863项目“新一代互联网技术综合实验环境”资助(2005AA112130)
关键词 保持前缀地址随机化算法 安全分析 概率分析 仿真评估 攻击方法 Prefix preserving IP address anonymization Security analysis
  • 相关文献

参考文献11

  • 1闫巧,吴建平,江勇.网络攻击源追踪技术的分类和展望[J].清华大学学报(自然科学版),2005,45(4):497-500. 被引量:15
  • 2McGregor T, Braun H, Brown J. The NLANR network analysis infrastructure [J]. IEEE Communications Magazine, 2000,38(5): 122-128.
  • 3Patarin S, Makpangou M. Pandora: A flexible network monitoring platform[A], Proc 2000 USENIX Annual Technical Conference[C], San Diego, CA, June, 2000. 27-40.
  • 4Peuhkuri M. A method to compress and anonyrnize packet traces[EB/OL], http://www. imconf.net/imw-2001/imw2001-papers/32. pdf, 2001.
  • 5Pang R, Paxson V. A high-level programming environment for packet trace anonymization and transformation [EB/OL], http://www. acm. org/sigs/sigcomm/sigcomm2003/papers/p339-pang. pdf,2003.
  • 6Krishnamurthy B, Wang J. On network-ware clustering of web clients[EB/OL], http://www, acm. org/sigs/ sigcomm/sigeomm2000/conf/paper/sigcomm2000-3-2.ps. gz,2000.
  • 7Minshall G. TCPdpriv Command Manual[EB/OL], http://ita. ee. Ibl. gov/html/contrib/tcpdpriv.0.txt.
  • 8Cho K, Mitsuya K, Kato A. Traffic data repository at the wide project [A], Proc USENIX 2000 Annual Technical Conference : FREENIX Track[C], San Diego, CA, June,2000,263-279.
  • 9XU Jun, FAN Jinliang, Ammar M, et al. Prefix-preserving IP address anonymization: measurement based security evaluation and a new cryptography-based scheme[A], ICNP 2002 [C], IEEE Computer Society, 2002, 280-289.
  • 10XU Jun, FAN Jinliang, Ammar M, et al. On the design and performance of prefix-preserving IP traffic trace anonymization[EB/OL], http://www. imconf. net/imw-2001/imw2001-papers/69. pdf,2001.

二级参考文献21

  • 1Dean D, Franklin M, Stubblefield A. An algebraic approach to IP traceback[A]. Proceedings of 2001 Network and Distributed System Security Symposium [C]. California:ACM, 2001.
  • 2Snoeren A C, Partridge C, Sanchez L A, et al. Hash based IP traceback [A]. Proceedings of 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (ACM SIGCOMM) [C].California:ACM, 2001. 3-14.
  • 3Sancbez L A, Milliken W C, Snoeren A C, et al. Hardware support for a hash-based IP traceback [A]. Proceedings ofthe 2nd DARPA Information Survivability Conference and Exposition (DISCEX-Ⅱ) [C]. Anaheim, CA, 2001. 146-152.
  • 4Bellovin S M. ICMP Traceback Messages, Internet Draft[S]. March 2001.
  • 5Mankin A, Massey D, Wu C, et al. On design and evaluation of intention-driven ICMP traceback[A].Proceedings of IEEE 10th International Conference on Computer Communications and Networks (IC3N'2001) [C].Scottsdale, Arizona USA, 2001.
  • 6Staniford-Cben S, Heberlein L T. Holding intruders accountable on the internet [A]. Proceedings of IEEE Symposium on Security and Privacy [C]. Oakland, CA,1995.
  • 7Zhang Y, Paxson V. Detecting stepping stones [A].Proceedings of 9th USENIX Security Symposium [C].Denver, CO, 2000.
  • 8Yoda K, Etoh H. Finding a connection chain for tracing intruders [A]. Proceedings of the 6th European Symposium on Research in Computer Security (LNCS 1985) [C].Toulouse, France, 2000.
  • 9Schnackenberg D, Djabandari K, Sterne D. Infrastructure for intrusion detection and response [A]. Proceedings of DARPA Information Survivability Conference & Exposition(DISCEX '00) [C]. Hilton Head, SC, USA: IEEE, 2000.
  • 10Wang X, Reeves D, Wu S F, et al. Sleepy watermark tracing: An active network-based intrusion response framework [A]. Proceedings of 16th International Conference on Information Security (IFIP/Sec 01)[C].Paris, IKM, 2001.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部