期刊文献+

基于跨区域追踪的确定包标记方案

Deterministic Packet Marking Scheme Based on Cross-regional Tracking
下载PDF
导出
摘要 提出一种可以跨区域追踪分布式拒绝服务攻击来源的确定包标记方案,通过将基于中国余数定理的数据包标记算法与DPM-RD方案结合,实现更好的追踪性能。理论分析与仿真结果表明,在攻击数量大幅增长的情况下,该方案的误报率基本不变,与同类方案相比,只需更少的数据包即可在较短时间内重构攻击路径。 This paper proposes a novel Deterministic Packet Marking(DPM) scheme to trace the cross-regional source of Distributed Denial of Service(DDoS) attack. It adopts a packet marking algorithm inspired by CRT, and combines DPM-RD scheme to achieve better performance. Theoretical analysis and simulations reveal that the increasing number of attacks do not effect the false positive rate significantly, and compared with similar schemes, the scheme can reconstruct attack path in a comparatively short time with less packets.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第22期168-169,172,共3页 Computer Engineering
基金 南京邮电大学青蓝计划基金资助项目(NY206055)
关键词 分布式拒绝服务攻击 追踪 包标记 跨区域 Distributed Denial of Service(DDoS) attack tracking Packet Marking(PM) cross-regional
  • 相关文献

参考文献8

  • 1Andery B, Nirwan A. Tracing Multiple Attackers with Deterministic Packet Marking[C]//Proc. of IEEE PACRIM'03. Victora, Canada: IEEE Press, 2003.
  • 2Belenky A, Ansari N. IP Traceback with Deterministic Packet Marking[J]. IEEE Communications Letters, 2003, 7(4): 162-164.
  • 3冯庆云,曲海鹏,周英,郭忠文.基于数据包标记的伪造IP DDoS攻击防御[J].计算机工程,2008,34(19):141-143. 被引量:2
  • 4高大鹏,於时才,闫文芝.复合包标记IP追踪算法研究[J].计算机工程,2009,35(10):115-117. 被引量:5
  • 5Jin Guan, Yang Jiangan. Deterministic Packet Marking Based on Redundant Decomposition for IP Traceback[J]. IEEE Communications Letters, 2006, 10(3): 204-206.
  • 6Jin Guan, Yang Jiangan, Wei W, et al. Across-domain Deterministic Packet Marking for IP Traceback[C]//Proc. of the 2nd International Conference on Communications and Networking. Shanghai, China : [s. n.], 2007: 382-386.
  • 7徐劲松.一种改进的路由包标记追踪方案[J].计算机应用,2009,29(5):1316-1320. 被引量:5
  • 8Koshy T. Elementary Number Theory with Applications[M]. 2nd ed. [S.l.]: Elsevier Publishing Co., 2007: 295-301.

二级参考文献17

  • 1SAVAGE S, WETHERALL D, KARLIN A, et al. Practical network support for IP traceback [ C]// Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. New York: ACM Press, 2000:295-306.
  • 2SONG D, PERRIG A. Advanced and authenticated marking schemes for IP traceback [ C]//Proceedings of Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies: INFO- COMM 2001. Washington, DC: IEEE Computer and Communications Soeieties, 2001, 2:878-$86.
  • 3DEAN D, FRANKLIN M, STUBBLEFIELD A. An algebraic approach to IP traceback[ J]. ACM Transactions on Information and System Security (TISSEC), 2002, 5(2): 119- 137.
  • 4YEAR A, PERRIG A, SONG D. FIT: fast Intemet traceback[ C]// Proceedings of 24th Annual Joint Conference of the IEEE Computer and Communications Societies: INFOCOMM 2005. Washington, DC: IEEE Computer and Communications Societies, 2005:1395 - 1406.
  • 5LIU J, LEE Z-J, CHUNG Y-C. Dynamic probabilistic packet marking for efficient IP traceback[ J]. Computer Networks: The International Journal of Computer and Telecommunications Networking, 2007, 51(3) : 866 -882.
  • 6Savage S, Wetherall D, Karlin A, et al. Practical Network Support for IP Trac-eback[C]//Proceedings of the 2000 ACM SIGCOMM Conference. Stockholm, Sweden:[s. n.], 2000.
  • 7Tanenbaum A S. Computer Networks[M]. 4th ed. lndianapois: Prentice Hall PTR, 2003.
  • 8Boneh A, Hofri M. The Coupon Collector Problem Revisited Commun[J]. Statist-Stochastic Models, 1997, 13(1): 39-66.
  • 9Ferguson P, Senie D. Network Ingress Filtering: Defeating Denial- of-Service Attacks which Employ IP Source Address Spoofing[S]. RFC 2827, 2000.
  • 10Lee Fuyuan, Shieh S. Defending Against Spoofed DDoS Attacks with Path-fingerprint[J]. Computer & Security, 2005, 24(7): 571-586.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部