期刊文献+

基于源-目的端ISP包标记方案研究

Research of Packet Marking Scheme Based on Source and Destination-End ISP
下载PDF
导出
摘要 提出了一个基于源-目的端ISP包标记方案。此方案不再用来重构攻击路径,而主要用于刻画DDoS攻击流特征。这些特征对于受害者过滤攻击非常有效。在过滤方面,提出了一个比率控制方案,通过限制攻击流并保持合法数据流不受影响来有效保护受害者。在经济方面ISP能提供更好的安全措施作为对客户的增值服务,因此也就更有积极性来部署。 In this paper,propose new packet marking models. It's not used for reconstructing the attack path, but characterizing DDoS attack streams. Such common characterization can be used to make filtering by the victim more effective. In terms of filtering,propose a rate control scheme that protects destination domains by limiting the amount of traffic during an attack, while leaving a large percentage of legitimate traffic unaffected. On economic front, it enable providers to offer enhanced security protection against such attacks as a value - added service to their customers, and hence offer positive incentives for them to deploy the proposed models.
出处 《计算机技术与发展》 2009年第4期98-100,104,共4页 Computer Technology and Development
基金 河南省自然科学基金(2003520257)
关键词 分布式拒绝服务攻击 包标记 比率控制 DDoS paeket marking rate control
  • 相关文献

参考文献8

  • 1Sehneier B. Secrets and Lies: Digital Security in a Networked World[M]. New York:John Wiley & Sons,2000.
  • 2Belenky A,Ansari N. On deterministic packet marking[J]. Computer Networks,2007,51:2677 - 2700.
  • 3Bureh H, Cheswiek H, Tracing anonymous packets to their approxirnate source[ C]//Proc. USENIX LISA Conf. New Orleans, LA: [s. n. ] ,2000:319 - 327.
  • 4Stoica I, Zhang H. Providing Guaranteed Servioes Without Per Flow Management [ C]//Proc. the 1999 ACM SIGCOMM Conf. Boston, MA: [ s. n. ], 1999:81 - 94.
  • 5Yaar A,PerrigA,Song D. Pi: a path identification mechanism to defend against DDoS attacks[C]//Proceedings of the IEEE Symposium on Secttrity and Privacy. Berkeley: IEEE Press, 2003: 93 - 107.
  • 6Yaar A, Perrig A, Song Dawn. Stack.Pi: new packet marking and filtering mechanism for DDoS and IP spoofing defense [R].US: Carnegie Mellon University,2003.
  • 7Rivest R L, The MD5 message digest algorithm[ S]. RFC, 1321, Interact Activities Board, Intemet Privacy Task Force, 1992.
  • 8孙知信,李清东.基于源目的IP地址对数据库的防范DDos攻击策略[J].软件学报,2007,18(10):2613-2623. 被引量:21

二级参考文献2

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部