期刊文献+

哈希在FCFS SAVI算法中的应用研究

The Applied Research on Hash in FCFS SAVI Algorithm
下载PDF
导出
摘要 FCFS SAVI是一种基于IPv6无状态地址自动配置协议的真实源地址验证方案,查找算法在该方案中起着关键作用.提出将哈希查找应用到FCFS SAVI方案中,详细分析哈希查找在FCFS SAVI方案中的性能,并进行了实验测试. FCFS SAVI is a real source address validation program,which is based on IPv6 stateless address auto-configuration protocol,the search algorithm plays a key role in the program.The paper proposes that hash lookup applies to FCFS SAVI algorithm,focus on analysing the advantges and disadvantages of hash in FCFS SAVI,and verifying by experiment.
出处 《辽宁大学学报(自然科学版)》 CAS 2012年第3期262-265,共4页 Journal of Liaoning University:Natural Sciences Edition
关键词 FCFS SAVI 查找算法 IPV6 源地址验证 FCFS SAVI search algorithm IPv6 source address validation
  • 相关文献

参考文献14

  • 1E. Nordmark, M. Bagnulo, E. Levy - Abegnoli. FCFS SAVI : First - Come First - Serve Source Address Vali- dation for Locally Assigned IPv6 Addresses [ S ], draft - ietf - savi - fcfs - 14. IETF,2012.
  • 2S. Thomson, T. Narten, T. Jinmei. RFCA862, IPv6 Stateless Address Autoconfiguration[ S]. IETF, 2007.
  • 3J. Wu, J. Bi, X. Li, G. Ren, K. Xu, M. Williams. RFC5210, A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience [ S ]. IETF, 2008.
  • 4Jianping Wu, Jun Bi, Marcelo Bagnulo, Fred Baker, Christian Vogt. Source Address Validation Improve- ment Framework, draft - ietf - savi - framework - 06[S]. IETF, 2011.
  • 5T. Narten, E. Nordmark, W. simpson, H. Soliman. RFC4861 [ S ], Neighbor Discovery for IP version 6 (IPv6). IETF, 2007.
  • 6R. Hinden, S. Deering. RFCA291. IP Version 6 Ad- dressing Architecture[ S ]. IETF, 2006.
  • 7吴建平,任罡,李星.构建基于真实IPv6源地址验证体系结构的下一代互联网[J].中国科学(E辑),2008,38(10):1583-1593. 被引量:21
  • 8严蔚敏主编.数据结构[M].清华大学出版社,2007/03
  • 9BYVoid.各种字符串Hash函数比较[DB/OL].http://www.byvoid.corn/blog/string-hash-compare,2008-09-28.
  • 10Christopher Clark. savi - ipv6 - Revision59 :/trunk/ bst[ DB/OL]. http:// savi -ipv6. googlecode, corn/ svn/trunkt/bst, 2002.

二级参考文献25

  • 1张科.多次Hash快速分词算法[J].计算机工程与设计,2007,28(7):1716-1718. 被引量:22
  • 2Kent S, Atkinson R. Security Architecture for the Internet Protocol. IETF, RFC2401. 1998
  • 3Bremler-Barr A, Levy H. Spoofing prevention method. In: Proc IEEE INFOCOM. Washington: IEEE, 2005. 536-547
  • 4Ferguson P, Senie D. Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing. IETF, RFC2827. 2000
  • 5Park K, Lee H. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. ACM SIGCOMM Comput Commun Rev, 2001, 31 (4): 15-26
  • 6Li j, Mirkovic J, Wang M, et al. SAVE: source address validity enforcement protocol. In: Proc IEEE INFOCOM. Washington: IEEE, 2002. 3:1557-1566
  • 7Jin C, Wang H. Hop-count filtering: an effective defense against spoofed DDoS traffic. In: Proc ACM CCS. New York: ACM, 2003. 30-41
  • 8Snoeren A, Partridge C, Sanchez L, et al. A Hash-based IP traceback. ACM SIGCOMM Comput Commun Rev, 2001, 31(4): 3-14
  • 9Lee H, Thing V, Xu Y, et al. ICMP traceback with cumulative path, an effcient solution for IP traceback. Infor- mation and Communications Security. Berlin: Springer, 2003. 124-135
  • 10Savage S, Wetherall D, Karlin A, et al. Pratical network support for IP traceback. ACM SIGCOMM, Comput Commun Rev, 2000, 30(4): 295-306

共引文献62

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部