期刊文献+

IP追踪中攻击路径重构问题的随机模型 被引量:2

A Stochastic Model of Attack Path Reconstruction Problem for IP Traceback
下载PDF
导出
摘要 建立了IP追踪中攻击路径重构问题的理想模型和扩展模型.基于概率包标记方法,将攻击路径的重构过程表述为一个收敛的随机过程,推导出收敛时间与路径长度、标记概率之间的数学定量关系,得出达到最小收敛时间需要满足的数学条件.实验结果表明,该模型理论值与实验结果一致,为深入研究概率包标记方法提供了理论依据. An ideal model and its extended model of attack path reconstruction for IP traceback were established.Based on the method of probabilistic packet marking,attack path reconstructing process could be described as a convergent stochastic process,and the quantitative relationship of convergence time,path length and marking probability was presented.The required condition to obtain minimum convergence time was derived.The simulation results show that experimental values coincide with the theory results very well.The model provides a theoretic foundation for further research work on probabilistic packet marking approach.
出处 《北京理工大学学报》 EI CAS CSCD 北大核心 2011年第2期168-172,共5页 Transactions of Beijing Institute of Technology
关键词 网络安全 拒绝服务攻击 IP追踪 概率包标记 network security denial of service IP traceback probabilistic packet marking
  • 相关文献

参考文献6

  • 1Burch H.Tracing anonymous packets to their approximate source[C] //Proceedings of the 2000 USENIX LISA Conference.New Orleans,USA:[s.n.] ,2000:319-327.
  • 2Stefan S,David W.Network Support for IP Traceback[J].ACM/IEEE Transactions on Networking,2001,9(3):236-237.
  • 3Andrey B,Nirwan A.On IP traceback[J].IEEE Communications Magazine,2003,41(7):142-153.
  • 4Park K,Lee H.On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack[C] //Proceedings of IEEE INFOCOM.Berkeley,California:IEEE Press,2001:338-347.
  • 5Ross S.A first course in probability[M].New Jersey:Prentice Hall,2006.
  • 6Richard M,Eli U.Probability and computing:randomized algorithms and probabilistic analysis[M].Cambridge:Cambridge University Press,2005.

同被引文献4

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部