期刊文献+

针对DoS攻击的IP跟踪技术研究 被引量:5

Study on IP Tracing Technologies against DoS Attact
原文传递
导出
摘要 IP追踪技术是检测和防御分布式拒绝服务攻击的重要手段,它的主要目的是想办法追踪到攻击数据包的源地址,弥补IP协议的不足。成熟的IP追踪技术可以有效抑制DDoS攻击的发生,对网络故障的诊断和减少数据包欺骗将有很大的帮助。文中对当前现有的IP追踪和攻击源定位技术作了系统的分类,分别对它们作了全面的分析并比较了相互之间的异同及优缺点。同时,针对当前的IP追踪和攻击源定位技术现状,讨论了其未来的发展趋势。 The IP tracing technology is an important means for detection and defense of distributed denial-of-service attack, with a principal purpose to trace the source address of attack data packet and remedy the deficiency of IP Protocol. The mature IP tracing technology could effectively depress the DDoS attack and reduce the faked packets, and be also used in network failure diagnosis. This paper systemically classifies the present IP tracing and source- finding technologies, comprehensively analyzes and compares various IP tracing and source-finding technologies. Based on the present situation, it also discusses the development trend of IP tracing and source-finding technologies.
出处 《信息安全与通信保密》 2012年第1期103-105,共3页 Information Security and Communications Privacy
关键词 DOS攻击 IP追踪技术 包标记 包记录 denial-of-service attacks(DoS) IP traceback packet marking packet logging
  • 相关文献

参考文献5

  • 1I MOORE D, VOELKER G, SAVAGE S. Inferring Intemet Denial of Service Activity[G]. IEEE/ACM Trans, Proceedings of 10th Usenix Security Symp. [s.1.]: IEEE/ACM, 2001.
  • 2I SAVAGE S, WETHERALL D, KARLIN A, et al. Network Support for IP Traceback[J]. IEEE/ACM Trans. Networking, 2001, 9(3): 226-237.
  • 3SNOEREN A, PARTRIDGE C, SANCHEZ L, et al. Single-Packet IP Traceback[J]. IEEE/ACM Trans. Networking, 2002, 10(6): 721-734.
  • 4SNOEREN A, PARTRIDGE C, SANCHEZ L, et al. Hash-Based IP Traceback[C]. IEEE/ACM Trans, Proceedings ofACMSIGCOMM' 01.[s.1.]: IEEE, 2001.
  • 5史力力,薛质,王轶骏.分布式防火墙与入侵检测联合系统的设计[J].信息安全与通信保密,2008,30(2):65-67. 被引量:7

二级参考文献3

共引文献6

同被引文献37

  • 1梁晓初,孙伟.基于认证的DDos攻击源追踪改进方案[J].信息安全与通信保密,2007,29(8):100-102. 被引量:1
  • 2谢逸,余顺争.应用层洪泛攻击的异常检测[J].计算机科学,2007,34(8):109-111. 被引量:6
  • 3I SAVAGE S, WETHERALL D, KARLIN A, et al. Network Support for IP Traceback[J]. IEEE/ACM Transaction on Networking, 2001, 9(3): 226-237.
  • 4BELENKY A, ANSARI N. IP Traceback with Deterministic Packet Marking[J]. IEEE Comm. Letter, 2003, 7(4): 162-164.
  • 5BELENKY A, ANSARI N. On Deterministic Packet Marking[J] Computer Networks, 2007, 51(10): 2677-2700.
  • 6PARK K, HEEJO L. On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack[C]//Proc. of IEEE INFOCOM. Anchorage, Alaska: [s.n.l, 2001: 338-347.
  • 7FENG Bo, GUO Fan, YU Min. Dynamic Probabilistic Packe1Marking Based On PPM[C]//Proceedings of Second Pacific-Asia Conference on Web Mining and Web-based Application. Wuhan, China: [s.n.], 2009: 289-292.
  • 8SONG D X, PERRIG A. Advanced and Authenticated Marking Schemes for IP Traceback[C]//Proceedingsof IEEE INFOCOM, IEEE Press. Anchorage, Alaska: [s.n.], 2001 : $78-886.
  • 9PENG T, LECKI C, KOTAGIRI R. Adjusted Probabilistic Packet Marking[C]//Proc. of the Second IFIP Networking Conference. Pisa, Italy: [s.n.], 2002: 697-708.
  • 10LIU J, LEE Z, CHUNG Y. Dynamic Probabilistic Packet Marking for Efficient IP Traceback[J]. Computer Networks, 2007, 51(3): 866-882.

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部