期刊文献+

IPV6园区网中基于源地址认证安全的应用研究

The Research of Source Address Validation Implementation on IPV6 Campus Network
下载PDF
导出
摘要 在IPV6园区网的接入使用中,怎样安全有效的判定接入用户IPV6地址合法、有效、真实是目前一个突出的问题。基于现有的IPV6技术,通过基于接入用户源地址的有效性安全校验(SAVI)技术研究应用,可以获取一种积极有效的提高IPV6园区网准入安全的途径。在未来IPV6园区网的应用中,提供一种有效安全的认证办法,最大限度的增加园区网IPV6技术的应用推广。 It is a serious problem that how to effectively judge the access user is a legal and real person in ipv6 campus network. We do a technology application research which is a project about Source Address Validation Implementation re- search based on ipv6 technology ,then we can get a positive and effective way to improve the IPV6 campus network access security. It is a effective and secure validation way on campus network of ipv6 in future. The results of this research can be applied to new developments on campus network of ipv6 technology.
作者 陈慧 任元彪
出处 《计算技术与自动化》 2012年第2期138-141,共4页 Computing Technology and Automation
关键词 园区网 安全 IPV6 SAVI Campus Network Security IPV6 SAVI
  • 相关文献

参考文献11

  • 1吴建平,任罡,李星.构建基于真实IPv6源地址验证体系结构的下一代互联网[J].中国科学(E辑),2008,38(10):1583-1593. 被引量:22
  • 2Jiahai Yang Network Research Center Tsinghua University "Definition of Managed Objects for SAVI Protocol" [EB/OL]. http: //datatraeker. ietf. org / wg / savi / charter / 6, 2011.
  • 3BREMLER- BARR A, LEVY H. Spoofing prevention method[C]//IEEE INFOCOM. Washington: IEEE, 2005: 536-547.
  • 4XU K,ZHU L, HUG. Tsinghua University "SAVI Requirements and Solutions for ISP IPv6 Access Network" http: // datatracker, ietf. org/doc/draft-shi-access/ 2011 - 11 - 22.
  • 5Susan Thomson, Nominum, Inc. September 2007, IPv6 Stateless Address Autoconfiguration [ EB/OL]. http:// tools, ietf. org/id/draft- ietf- ipv6-rfc2462bis.
  • 6ROY S. Sun Microsystems, Inc. IPv6 Neighbor Discovery On-Link Assumption Considered Harmful[EB/OL]. http:// datatracker, ietf. org/doc/rfc4943/.
  • 7李晶.IPv6技术与应用[J].邮电商情,2002,9(19):19-20. 被引量:2
  • 8WU J,BI J, LI X, et al. A source address validation architecture (SAVA) testbed and experiences [C]//RFC5210. IETF, 2008.
  • 9禹龙,田生伟.基于真实IPv6源地址的网络接入认证技术研究[J].计算机应用与软件,2010,27(12):121-122. 被引量:4
  • 10WU J ,REN G, LI X. Source address validation: architecture and protocol design[C]//ICNP. 2007.

二级参考文献16

  • 1Kent S, Atkinson R. Security Architecture for the Internet Protocol. IETF, RFC2401. 1998
  • 2Bremler-Barr A, Levy H. Spoofing prevention method. In: Proc IEEE INFOCOM. Washington: IEEE, 2005. 536-547
  • 3Ferguson P, Senie D. Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing. IETF, RFC2827. 2000
  • 4Park K, Lee H. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. ACM SIGCOMM Comput Commun Rev, 2001, 31 (4): 15-26
  • 5Li j, Mirkovic J, Wang M, et al. SAVE: source address validity enforcement protocol. In: Proc IEEE INFOCOM. Washington: IEEE, 2002. 3:1557-1566
  • 6Jin C, Wang H. Hop-count filtering: an effective defense against spoofed DDoS traffic. In: Proc ACM CCS. New York: ACM, 2003. 30-41
  • 7Snoeren A, Partridge C, Sanchez L, et al. A Hash-based IP traceback. ACM SIGCOMM Comput Commun Rev, 2001, 31(4): 3-14
  • 8Lee H, Thing V, Xu Y, et al. ICMP traceback with cumulative path, an effcient solution for IP traceback. Infor- mation and Communications Security. Berlin: Springer, 2003. 124-135
  • 9Savage S, Wetherall D, Karlin A, et al. Pratical network support for IP traceback. ACM SIGCOMM, Comput Commun Rev, 2000, 30(4): 295-306
  • 10Belenky A, A~sari N. IP traceback with deterministic packet marking. IEEE Commun Lett, 2003, 7(4): 162-164

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部