期刊文献+

基于协作交互的概率性数据包标记溯源方法 被引量:1

A Traceback Approach with Probabilistic Packet Marking IP Based on Cooperations
原文传递
导出
摘要 为了从根本上消除拒绝服务攻击等恶意入侵行为,保障通信软件服务器的安全,而又不会过多增加网络设备的开销,提出了一种基于协作交互三层框架结构的概率性数据包标记溯源(CPPM)方法.该算法根据当前网络中路由器的负载情况,自适应动态调整该路由器数据包标记概率和标记信息传递方式,可以用较小的网络开销快速地找到入侵源.仿真结果证明了CPPM方法的有效性和实用性. In order to eliminate the attack in a quick mode and ensure the safety of communication software servers without too much overhead on routers,with a three layer framework,a traceback approach with probabilistic packet marking Internet protocol is proposed based on cooperations,called cooperation based probabilistic packet marking(CPPM).The proposed algorithm adjusts the marking probability and marking information transmission fashion according to the load of routers in the network.It can reconstruct the attack path back to the intrusion source in a quick mode with less impact on the network.Simulations show the effectiveness and practicability of the algorithm.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2012年第1期51-54,共4页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金委创新研究群体项目(60821001)
关键词 通信软件安全 概率性数据包标记 协作交互 三层溯源框架 communication software security probabilistic packet marking cooperation three layers framework
  • 相关文献

参考文献8

  • 1Snoeren A,Partridge Craig,Sanchez L,et al.Single-packet IP traceback[J].IEEE/ACM Transactions onNetworking,2002,10(6):721-734.
  • 2Gong Chao,Sarac Kamil.A more practical approach forsingle-packet IP traceback using packet logging and mark-ing[J].IEEE Transactions on Parallel and DistributedSystems,2008,19(10):1310-1324.
  • 3Savage S,Wetherall D,Karlin A,et al.Network supportfor IP traceback[J].IEEE/ACM Transactions on Net-working,2001,9(3):226-237.
  • 4Gong Chao,Sarac Kamil.Toward a practical packetmarking approach for IP traceback[J].InternationalJournal of Network Security,2009,8(3):271-281.
  • 5Arbor Networks Inc.2010 Worldwide infrastructure secu-rity report[EB/OL].Chelmsford,Massachusetts:ArborNetworks Inc.(2010-09-16)[2011-11-15].http:∥www.arbornet-works.com/report/.
  • 6Stoica I,Zhang H.Providing guaranteed services withoutper flow management[C] ∥ACM SIGCOMM 1999.Cambridge:ACM,1999:81-94.
  • 7Xiang Yang,Zhou Wanlei,Guo Minyi.Flexible deter-ministic packet marking:an IP traceback system to findthe real source of attacks[J].IEEE Transacions on Par-allel and Distributed Systems,2009,20(4):567-580.
  • 8Theilmann W,Rothermel K.Dynamic distance maps ofthe Internet[C] ∥IEEE INFOCOM 2000.Tel Aviv:IEEE,2000:275-284.

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部