期刊文献+

一种改进的数据包标记追踪方案——CDPM 被引量:2

CDPM:An improved packet marking tracking scheme
下载PDF
导出
摘要 为了提高受害端重构攻击路径的效率,提出了一种周期式确定包标记的复合式方案。该方案以5个分片一组表示边信息,路由器周期式地对数据包进行标记。对于边状态的变化,方案采用路由器检测标记信息的方法进行同步,以确保标记的准确性和鲁棒性。与传统的概率包标记方案相比较,该方案只需要标记较少的数据包即可重建攻击路径,较好处理含伪造地址的数据包,有效地解决了数据包遗失的问题。理论分析与实验结果证明了该方案的有效性。 In order to improve the efficiency of path reconstruction, a novel scheme was proposed. In this scheme, one edge was constituted by five fragments. Packets were deterministically marked by routers in a cyclical fashion. The state of edge was synchronized by checking the marked packets in order to keep accurate and robust marking. Analyses and simulations show the scheme is effective. Compared with traditional probabilistic marking techniques, this scheme requires less marked packets to reconstruct the attacking-path. And it is also more resilient to packet spoofing, and solves the issue of packet loss well.
出处 《计算机应用》 CSCD 北大核心 2009年第12期3185-3187,3200,共4页 journal of Computer Applications
基金 南京邮电大学青蓝计划基金资助项目(NY206055)
关键词 分布式拒绝服务攻击 追踪 包标记 路由器 Distributed Denial of Service (DDoS) tracing Packet Marking (PM) router
  • 相关文献

参考文献10

  • 1SAVAGE S, WETHERALL D, KARLIN A, et al. Practical network support for IP traceback [ C ]// Proceedings of 2000 ACM SIGCOMM Conference. New York: ACM Press, 2000:295 -306.
  • 2张立莉,曹天杰,汤丽娟.一种改进的概率包标记方案[J].计算机工程,2008,34(7):148-150. 被引量:6
  • 3WALDVOGEL M. GOSSIB vs. IP traceback rumors [ C]// Proceedings of 18th Annual Computer Security Applications Conference. Washington, DC: IEEE, 2002:5-13.
  • 4BELENKY A, ANSARI N. IP traceback with deterministic packet marking [J]. IEEE Communications Letters, 2003, 7(4) : 162 - 164.
  • 5BELENKY A, ANSARI N. Tracing multiple attackers with Deterministic Packet Marking (DPM) [ C]// PACRIM 2003: IEEE Pacific Rim Conference on Communications, Computers and signal Processing. Washington, DC: IEEE, 2003:49-52.
  • 6QU z, HUANG C. A novel deterministic packet marking scheme for IP traceback [ C]// IEEE PEITS '08. Washington, DC: IEEE Computer Society, 2008:38-41.
  • 7SIRIS V A , STAVRAKIS I . Provider - based deterministic packet marking against distributed DoS attacks [ J]. Journal of Network and Computer Applications, 2007, 30(3) : 858 - 876.
  • 8GAO Z, ANSARI N. A practical and robust inter-domain marking scheme for IP traceback [ J]. Computer Networks, 2007, 51 (3) : 732 - 750.
  • 9刘渊,李秀珍,朱晓键.防TTL值欺骗的数据包标记算法研究[J].计算机工程与应用,2008,44(23):127-129. 被引量:2
  • 10SAVAGE S, WETHERALL D, KARLIN A, et al. Network support for IP traceback [ J]. IEEE/ACM Transactions on Networking, 2001, 9(3) : 226 -237.

二级参考文献14

  • 1曲海鹏,李德全,苏璞睿,冯登国.一种分块包标记的IP追踪方案[J].计算机研究与发展,2005,42(12):2084-2092. 被引量:9
  • 2曲海鹏,冯登国,苏璞睿.基于有序标记的IP包追踪方案[J].电子学报,2006,34(1):173-176. 被引量:6
  • 3Savage S,Wetherall D,Karlin A,et al.Practical network support for IP traceback[C]//Proceedings of the 2000 ACM SIGCOMM Conference, Stockholm, Sweden, 2000 : 295-306.
  • 4Peng T,Leckie C,Kotagiri R.Adjusted probabilistic packet marking for IP traceback[C]//Proceedings Of the 2nd IFIP Networking Conference(Networking 2002), Pisa, Italy, 2002: 697-708.
  • 5Savage S,Wetherall D,Karlin A,et al.Network support for IP traceback[J].IEEE/ACM Transactions on Networking,2001,20(2): 226-237.
  • 6Savage S,Wetherall D,Karlin A,et al.Practical network support for IP traceback[C]//ACM SIGCOMN, 2000 : 295-306.
  • 7Adler I,Ross S M.The coupon subset collection problem[J].Joumal of App lied Probability,2001(3):737-746.
  • 8Cai D A,Cooperative association for internet data analysis[EB/OL]. (2006-05).http ://www.caida.org.
  • 9Hamadeh I, Kesidis G. A Taxonomy of Internet Traceback[J]. Security and Networks, 2006, 1(1/2): 54-61.
  • 10Burch H, Cheswick B. Tracing Anonymous Packets to Their Approximate Source[C].Proc. of the 14th Conf. on Systems Administration. Usenix Assoc: [s. n.], 2000.

共引文献6

同被引文献20

  • 1蒋泽,顾朝志.无线信道模型综述[J].重庆工学院学报,2005,19(8):63-67. 被引量:5
  • 2曲海鹏,冯登国,苏璞睿.基于有序标记的IP包追踪方案[J].电子学报,2006,34(1):173-176. 被引量:6
  • 3SAVAGE S, WETHERALL D, KARLIN A, et al. Practical network support for IP traceback [ C]//Proceedings of the ACM SIGCOMM 2000 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. New York: ACM Press, 2000:295-306.
  • 4XIANG Y, ZHOU W L, GUO M Y. Flexible deterministic packet marking: An IP traceback system to find the real source of attacks [ J]. IEEE Transactions on Parallel and Distributed System, 2009, 20(5) : 567 -580.
  • 5CHANG H Y, NARAYAN R, WU S F, et al. DECIDUOUS: De- centralized source identification for network-based intrusions [ C]// Proceedings of the Sixth IFIP/IEEE International Symposium on In- tegrated Network Management. Boston, USA: [s. n. ], 1999:701 -714.
  • 6SNOEREN A C, PARTRIDGE C, SANCHEZ L A, et al. Hash- based IP traceback [ C] // Proceedings of the ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Pro- tocols for Computer Communication. New York: ACM Press, 2001: 3 -14.
  • 7GONG C, SARAC K. A more practical approach for single-packet IP traceback using packet logging and marking [ J]. IEEE Transac- tions on Parallel and Distributed System, 2008, 19(10) : 1310 - 1324.
  • 8CHEN R L, PARK J M, MARCHANY R, et al. RIM: Router in- terface marking for IP traceback [ C]// Global Telecommunications Conference. San Francisco, USA: [s.n.], 2006:1-5.
  • 9MUTHUPRASANNA M, MANIMARAN G, MANZOR M, et al. Coloring the Intemet: IP traceback [ C]// Proceedings of the 12th International Conference on Parallel and Distributed Systems. Min- nesota, USA: [ s. n. ], 2006:589 -598.
  • 10江雍,林其伟.一种基于Evalvid的H.264视频QoS评估改进系统[J].电视技术,2007,31(10):59-61. 被引量:5

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部