期刊文献+

基于矩阵边采样的IP追踪 被引量:1

IP traceback with matrix edge sampling
下载PDF
导出
摘要 针对Savage概率包标记压缩边分片采样算法存在的不足,提出改进的压缩分片采样方法,即基于矩阵边采样的IP追踪方法 (IP traceback with matrix edge sampling,MES).通过1个二维单位矩阵对相邻路由进行边采样,降低重构算法复杂度;引入8 bit的多路径检验,降低重构路径误报率;采用自适应概率对数据包标记,使重构路径所需数据包数量减少.理论分析和在NS2环境下的实验仿真表明,MES方法的性能在上述3方面都有较大改善. The Internet protocol(IP) traceback with matrix edge sampling (MES) was proposed based on compressed edge fragment sampling algorithm of probabilistic packet marking (PPM). The MES algorithm reduced the complexity of reconstruction algorithm by applying a two-dimensional matrix to the edge sampling between adjacent routes. Moreover, eight bits hash was employed to check the attack paths in order to reduce false alarm rate of reconstruction paths. The MES reduced the arnount of packets to reconstruct the path by using adaptive proba- bility for packet marking. Theoretical analysis and experimental simulation in NS2 environment have shown that the performance of new algorithm is improved on the amount of packets to reconstruct the path. The computational complexity of reconstruction and false alarm rate are also reduced efficiently.
作者 闫巧 宁土文
出处 《深圳大学学报(理工版)》 EI CAS 北大核心 2012年第5期399-404,共6页 Journal of Shenzhen University(Science and Engineering)
基金 国家自然科学基金资助项目(60972011)~~
关键词 数据安全 计算机安全 IP追踪 概率包标记 网络安全 拒绝服务攻击 分布式拒绝服务攻击 压缩边分片采样算法 自适应概率分片标记算法 data security computer security Internet protocol traceback probabilistic packet marking networksecurity denial of service attack distributed denial of service attack compressed edge fragment sampling algo-rithm adaptive probability fragment marking algorithm
  • 相关文献

参考文献13

  • 1Belenky A, Ansari N. On IP traceback [ J ]. IEEE Communications Magazine, 2003, 41(7) : 142-153.
  • 2Stone R. Center track: an IP overlay network for tracking Dos floods [ C ]// Proceedings of 2000 USENIX Security Symposium. Denver (USA) , 2000 : 199-212.
  • 3Burch H, Cheswick B. Tracing anonymous packets to their approximate source [ C ]// Proceedings of 2000 USENIX LISA Conference. Seattle ( USA), 2000: 319- 327.
  • 4Sung M, Xu J, Li J, et al. Large-scale IP traceback in high-speed internet: practical techniques and information- theoretic foundation [ J ]. IEEE/ACM Transactions on Networking, 2008, 16(6): 1253-1266.
  • 5Savage S, Wetherall D, Karlin A, et al. Network sup- port for IP traceback [ J ]. IEEE/ACM Transactions on Networking, 2001, 9(3): 226-237.
  • 6闫巧,夏树涛,吴建平.改进的压缩边分段采样算法[J].西安电子科技大学学报,2006,33(5):824-828. 被引量:6
  • 7LIU Jenshiuh, LEE Zhi-Jian, CHUNG Yeh-Ching. Dy- namic probabilistic packet marking for efficient IP trace- back [ J ]. The International Journal of Computer and Tel- ecommunications Networking, 2007, 51 (3) : 866-882.
  • 8吕俊杰,刘丽.一种新的IP追踪的分片标记方法[J].计算机工程与应用,2010,46(13):4-7. 被引量:2
  • 9Dean D, Franklin M, Stubblefield A. An algebraic ap- proach to IP traceback [ J]. ACM Transactions on Infor- rnation and System Security, 2002, 5 (2) : 119-137.
  • 10Pegah Sattari, Minas Gjoka, Athina Markopoulou. A Network coding approach to IP traceback [ C ]// IEEE International Symposium on Network Coding (NetCod). Toronto: [s. l. ], 2010: 1-6.

二级参考文献17

  • 1Paul F,Daniel S.RFC 2827 Network ingress filtering:Defeating denial of service attacks which employ IP source address spoofing[S/OL].2000.http://www.ieff.org/rfc/rfc2827.txt.
  • 2Burch H,Cheswick B.Tracing anonymous packets to their approximate source[C]//Proceedings of 2000 USENIX LISA Conference,Seattle,Washington,USA,2000:319-327.
  • 3Stone R.CenterTrack:An IP overlay network for tracking DoS floods[C]//Proceedings of 2000 USENIX Security Symposium,Denver,Colorado,USA,2000:199-212.
  • 4Glenn S.security fun with ocxmou and cflowd[R/OL].Presentation at the Internet 2 Working Group,1998.http://www.caich.org/.projects/NGI/content/security/1198.
  • 5Bellovin S.ICMP traceback messnges[EB/OL].(2OOO).http://www.research.att.com/-smb.
  • 6Savage S,Wetherall D,Karlin A,et al.Network support for IP traceback[J].IEEE/ACM Transactions on Networking,2001,9 (3):226-237.
  • 7Song D,Perrig A.Advaneed and authenticated marking schemes for IP traceback[C]//Proceedings of the 20th Annual Joint Conference on IEEE Computer and Communications Societies.Anchorage:IEEE INFOCOM,2001:878-886.
  • 8Peng T,Lecki C,Ramamohanroa K.Adjusted probabilistic packet marking[C]//Proceedings of Networking 2002.Pisa:IEEE Computer Society,2002:697-708.
  • 9Durresi A,Paruchuri V,Barolli L,et al.Efficient and secure autonomous system based traceback[J].Journal of Interconnection Networks,2004,5:151-164.
  • 10Boneh A,Hofri M.The coupon-ceilector problem revisited[J].commun Statist Stochastic Models,1997,13(1):39-66.

共引文献6

同被引文献15

  • 1DOULIGERIS C, MITROKOTSA A. DDoS attacks and defense mechanisms:classification and state-of-the-art[J]. Computer Networks, 2004, 44(5):643-666.
  • 2SAVAGE S, WETHERALL D, KARLIN A, et al. Practical network support for IP traceback[J]. Journal of Clinical Epidemiology, 2001, 30(4):295-306.
  • 3SONG D X, PERRIG A. Advanced and authenticated marking schemes for IP traceback[C]//Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies. Piscataway, NJ:IEEE, 2001:878-886.
  • 4GOODRICH M T. Probabilistic packet marking for large-scale IP traceback[J]. IEEE/ACM Transactions on Networking, 2008, 16(1):15-24.
  • 5WANG X J, WEI S J. IP traceback based probabilistic packet marking and randomized network coding[C]//Proceedings of the 2nd International Workshop on Computer Science and Engineering. Piscataway, NJ:IEEE, 2009:151-154.
  • 6SATTARI P, GJOKA M, MARKOPOULOU A. A network coding approach to IP traceback[C]//Proceedings of the 2010 IEEE International Symposium on Network Coding. Piscataway, NJ:IEEE, 2010:1-6.
  • 7YAN Q, NING T W. IP traceback with matrix edge sampling[J]. Journal of Shenzhen University (Science and Engineering), 2012, 29(5):399-404.
  • 8DONOHO D L. Compressed sensing[J]. IEEE Transactions on Information Theory, 2006, 52(4):1289-1306.
  • 9CANDES E J, ROMBERG J, TAO T. Robust uncertainty principles:exact signal reconstruction from highly incomplete frequency information[J]. IEEE Transactions on Information Theory, 2006, 52(2):489-509.
  • 10GOLD R. Optimal binary sequences for spread spectrum multiplexing[J]. IEEE Transactions on Information Theory, 1967, 13(4):619-621.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部