期刊文献+

IP溯源技术及其分类方法研究 被引量:2

IP Traceback and Analysis towards a Classification of Mechanisms
下载PDF
导出
摘要 缺乏统一分类方法是影响IP溯源技术研究与应用的重要因素,论文研究了各种IP溯源技术原理与特点,提出按行为模式、结构构成、实现层次、实现方式、适用范围五方面构建IP溯源技术分类方法体系,应用此方法对当前主要IP溯源技术进行了分类。 Classification of mechanisms is a key element to the research and application of IP traceback.This paper explores nature and characters of different IP traceback mechanisms,gives a classification towards IP traceback from five different aspects: behavior,structure,layer of actualization,mode of actualization,applicable area.Moreover,this paper classifies important IP traceback mechanisms by using this classification.
作者 林白露 杨百龙 毛晶 武鹏辉 LIN Bai-lu,YANG Bai-long,MAO Jing,WU Peng-hui(The Second Artillery Engineering College,Xi’an 710025,China)
出处 《电脑知识与技术》 2012年第5期3044-3046,共3页 Computer Knowledge and Technology
关键词 IP溯源技术 溯源技术特点 溯源技术分类 IP traceback characters of IP traceback classification of IP traceback
  • 相关文献

参考文献11

二级参考文献30

  • 1李德全,徐一丁,苏璞睿,冯登国.IP追踪中的自适应包标记[J].电子学报,2004,32(8):1334-1337. 被引量:33
  • 2郜秋娟.利用反弹服务器进行DDoS攻击的分析与防范[J].现代电子技术,2004,27(18):56-57. 被引量:3
  • 3闫巧,吴建平,江勇.网络攻击源追踪技术的分类和展望[J].清华大学学报(自然科学版),2005,45(4):497-500. 被引量:15
  • 4Lee S C, Shields C. Tracing the Source of Network Attack: A Technical, Legal and Societal Problem[C]//Proceedings of the 2001 IEEE, Workshop on Information Assurance and Security, NY United States Military Academy, West Point, 2001:5-6.
  • 5StefanSavage, DavidWetherall, AnnaKarlin, et al. Practical Network Support for IP Traceback[D]. WA, USA:Department of Computer Science and Engineering University of Washington Seattle. 2000.
  • 6Vadim Kuznetsov. Andrei Simkin. Helena Sandstrom. An evaluation of different IP traceback approaches[D]. Sweden Department of Computer Science and Electrical Engineering Lulea University of Technology, SE-971 87 Lulea, 2003.
  • 7Andreou M S, van Moorsel. Logging Switched Ethernets[D]. UK:School Based IP Traceback in of Computing Science Newcastle University Newcastle upon Tyne, 2006.
  • 8Snoerent A C, Partridge C, Sanchez L A, et al. Hash-Based IP Traceback[D]. Cambridge, BBN Technologies10 Moulton Street 2001.
  • 9Song D X, Perrig A. Advanced and Authenticated Marking Schemes for IP Traceback[D]. California: Computer Science Division (EECS)University of California Berkeley, 2000.
  • 10Belenky A, Ansari N. Internet Deployment of DPM-based IP Traceback[J]. Journal of Computing and Information Technology-CIT 16, 2008(02): 109-118.

共引文献33

同被引文献19

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部