期刊文献+

互联网假冒源地址攻击的分类

Classification of source address spoofing in the Internet
原文传递
导出
摘要 假冒源地址攻击具有容易实施、不易被追溯的特点,这种攻击行为在互联网上日益猖獗。该文总结了互联网假冒源地址问题、探索其攻击的各种形式、分析其带来的危害。将假冒源地址攻击用3个基本要素描述为:攻击者A,攻击目标V和被假冒主机H。根据H与A和V的相对拓扑结构,将假冒源地址攻击归纳为在网外H0、攻击目标H1、攻击目标子网H2、攻击者子网H3、攻击者与攻击目标路径上H4及其他H56类。这将有助于清晰地理解真实地址问题,指导假冒源地址防御技术的设计,为建立保证源地址真实性的互联网体系结构奠定基础。 Source address spoofing has become a widely used mechanism for attacks because it can be easily launched and is difficult to defend against and trace. Therefore, the classification of network attacks based on source address spoofing is very important. This paper presents a survey of the modes of source address spoofing and their effect on the Internet. The source address spoofing attacks are related to the attacker, the victim and the spoofed host. Source address spoofing attacks can be classified into six categories based on the position of the host being spoofed. This classification clarifies the problems of source address spoofing which will lead to improved prevention methods as a foundation of a trustworthy Internet architecture.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2009年第8期1237-1240,共4页 Journal of Tsinghua University(Science and Technology)
基金 国家"九七三"重点基础研究发展计划(2009CB320501) 国家"十一五"科技支撑计划(2008BAH37B02)
关键词 假冒源地址 攻击分类 IP伪造 source address spoofing classification of attacks IP spoofing
  • 相关文献

参考文献16

  • 1Tanase M. IP spoofing introduction [OL]. (2003-03-11). http: //www. securityfocus, com/infocus/ 1674.
  • 2MIT IP spoofer project website [OL]. [2008 05-26] http: //spooler. csail, mit. edu/summary, php.
  • 3Computer Emergency Response Team (CERT). TCP SYN flooding and IP spoofing attacks [OL]. (2000-11-29). http: //www. cert. org/advisories/CA-1996-21, html .
  • 4Wang H, Jin G, Shin K G. Defense against spoofed IP traffic using hop-count filtering [J]. ACM Transactions on Networking, 2007, 15(1): 40-53.
  • 5Moore D, Voelker G, Savage S. Inferring internet denial-of-service activity [J]. ACM Transactions on Computer Systems, 2006, 24(2) : 115 - 139.
  • 6Santiraveewan V, Permpoontanal.arp Y. A graph-based methodology for analyzing IP spoofing attack [C]//18th AINA. Washington: IEEE Press, 2004:227-231.
  • 7Ferguson P, Senie D. Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing [R/OL]. (2000-05-01). RFC 2827, 2000. http: //www. ietf. org/rfc2827, txt?number = 2827.
  • 8Jin G, Wang H, Shin K G. Hop-count filtering: An effective defense against spoofed DDoS traffic [C]//Proc 10th ACM Conference on Computer and Communication Security. New York: IEEE Press, 2003:30 - 41.
  • 9Lee K, Kim J, Kwon K H, et al. DDoS attack detection method using cluster analysis [J]. Expert Systems with Applications, 2008, 34(3) : 1659 - 1665.
  • 10Eddy W. Defenses against TCP SYN flooding attacks [J]. The Internet Protocol Journal, 2006, 9(4): 2- 16.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部