期刊文献+

复合包标记IP追踪算法研究 被引量:5

Research on Composed Packet Marking for IP Traceback Algorithm
下载PDF
导出
摘要 在压缩边分段采样算法研究改进基础上,分析攻击路径距离、路由器节点流量统计对标记概率的影响,提出一种复合包标记方法。该方法可以优化算法收敛性,降低运算复杂度和重构路径的差错率,使受害者在最短时间内推测出主要攻击路径,能够很好地应用于多个分布式拒绝服务攻击的攻击源追踪中。 Based on the current research on improving the Compressed Edge Fragment Sampling(CEFS) algorithm of Savage, the relations among the distance of the attacking path, the statistics on the traffic of touters, marking probability are analyzed. A new approach of composed packet marking method is proposed. In the new proposal the convergence of mathematic is optimized, computational complexity and the false positive alarm for the victim to reconstruct the attack graph is reduced, a victim can construct major attacking path in minimum time. The method can be used in tracking DDoS attacks of multi-source by establishing a simulated test environment and experiment analysis.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第10期115-117,共3页 Computer Engineering
基金 甘肃省自然科学基金资助项目(ZS031-A25-015-G)
关键词 拒绝服务攻击 IP追踪 压缩边分段采样算法 Denial of Service(DoS) attack IP traceback Compressed Edge Fragment Sampling(CEFS)
  • 相关文献

参考文献5

  • 1Savage S, Wetherall D, Karlin A, et al. Practical Network Support for IP Trac-eback[C]//Proceedings of the 2000 ACM SIGCOMM Conference. Stockholm, Sweden:[s. n.], 2000.
  • 2梁丰,赵新建,David Yau.通过自适应随机数据包标记实现实时IP回溯(英文)[J].软件学报,2003,14(5):1005-1010. 被引量:22
  • 3Tanenbaum A S. Computer Networks[M]. 4th ed. lndianapois: Prentice Hall PTR, 2003.
  • 4Boneh A, Hofri M. The Coupon Collector Problem Revisited Commun[J]. Statist-Stochastic Models, 1997, 13(1): 39-66.
  • 5Ferguson P, Senie D. Network Ingress Filtering: Defeating Denial- of-Service Attacks which Employ IP Source Address Spoofing[S]. RFC 2827, 2000.

二级参考文献7

  • 1Banga G,Dnlsched P,Mogul J.Resource containers:A new facility for resource management in server system.J In:OSDI ed.Proceedings of the 1999 USENIX/ACM Symposium on Operating System Design and Implementation(OSDI'99).New Orleans,LA:OSDI,1999.45-58.
  • 2Spatscheck O.Peterson L.Defending against denial of service attacks in scout In:OSDI,ed.Proceedings of the 1999 USENIX/ACM Symposium on Operationg System Design and Implementation(OSDI'99)New orleans,LA:OSDI,1999,59-72
  • 3Meadows c.A formal framework and evaluation method for network denial of service In:PCSFW,ed.Proceeding.Of the 1999 IEEE Computer Security Foundations Workshop.Mordano IEEE Compmer Society Press,1999.4-13.
  • 4Savage S,Wetherall D,Karlin A,Anderson T.Practical network support for lP traceback.1n:ACM,ed.Proceedings of the ACM SIGCOMM 2000.Sweden:ACM,2000.295-300.
  • 5Song D,Perrig A.Advanced and authenticated techniques for IP traceback In:INFOCOM,ed.Proceedings of the IEEE INFOCOM 2001.Anchorage:INFOCOM,2001
  • 6Mayeda W.Graph Theory.NewYork:Wiley-Interscience,1972.
  • 7Klamkin M,Newmall D.Extensions of the birthday surprise Journal of Combinatorial Theory,1967.279~282.

共引文献21

同被引文献46

  • 1曲海鹏,李德全,苏璞睿,冯登国.一种分块包标记的IP追踪方案[J].计算机研究与发展,2005,42(12):2084-2092. 被引量:9
  • 2曲海鹏,冯登国,苏璞睿.基于有序标记的IP包追踪方案[J].电子学报,2006,34(1):173-176. 被引量:6
  • 3陈星星,徐红云.IP追踪中PPM算法的改进研究[J].计算机工程,2006,32(21):164-166. 被引量:5
  • 4MA Ting.A link signature based DDoS attacker tracing algorithm under IPv6[J].International Journal of Security and Its Applications,2009,3(2):27-36.
  • 5BURCH H,CHESWICK B.Tracing anonymous packets to their approximate source[C]//Proc of the 14th Conference on Systems Administration.[S.l.]:USENIX Association,2000:319-327.
  • 6SAVAGE S,WETHERALL D,KARLIN A,et al.Network support for IP traceback[J].ACM/IEEE Trans on Networking,2001,9(3):226-237.
  • 7SONG D X,PERRIG A.Advanced and authenticated marking schemes for IP traceback[C]//Proc of the 20th Annual Joint Confe-rence on IEEE Computer and Communications Societies.[S.l.]:IEEE Press,2001:878-886.
  • 8PARK K,LEE H.A proactive approach to distributed DoS attack prevention using route based packet filtering,CSD00-017[R].West Lafayette:Purdue University,2000.
  • 9SNOREN A C,PARTRIDGE C,SANCHEZ L A.Hash-based IP traceback[C]//Proc of Conference on Application,Technologies,Architectures,and Protocols for Computer Communications.New York:ACM,2001:3-14.
  • 10SAVAGE S,WETHHERALL D,KARLIN A,et al.Practical network support for IP traceback[J].ACM SIGCOMM Computer Commuaication Review,2000,30(4):295-306.

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部