期刊文献+

基于动态概率的多条标记IP追踪方法 被引量:2

A Multi-Packet Marking Method for IP Traceback based on DPPM
原文传递
导出
摘要 针对动态概率包标记方法中标记空间受限问题,在现有动态概率算法的基础上,将动态概率包标记与多条标记思想相结合,设计了一种新的多条标记方法:n倍多条标记方法来完成IP追踪过程,并设计了相应模拟实验来测试该方法。实验结果表明,该方法完成IP追踪所需攻击包数是现有动态概率包标记方法的1/n。实验测试表明,n倍多条标记方法具备良好的可行性,可有效追踪ICMP洪水攻击。 Aiming at the problem of limited marking space existing in DPPM, a new packet marking method known as n-Muhi-DPPM is proposed, and this method, in combination of dynamic probabilistic algorithm and multi- tags marking technology based on DPPM, implements IP traceback. Then a simulation experiment is designed to test n-Muhi-DPPM, and the experiment results indicate that the number of packets needed for implementing IP traceback under n-Multi-DPPM is 1/n of the number of packets under DPPM. Thus, n-Muhi-DPPM is of good feasibility and could trace ICMP flood attack efficiently.
出处 《信息安全与通信保密》 2013年第3期66-69,共4页 Information Security and Communications Privacy
基金 国家自然科学基金资助 项目名称"基于彩色空间特征分析的数字图像被动防伪鉴定研究"(批准号:61071152)
关键词 动态概率包标记 n倍多条标记 IP追踪 ICMP洪水 DPPM n-Muhi-DPPM IPtraceback ICMPflood
  • 相关文献

参考文献13

  • 1I SAVAGE S, WETHERALL D, KARLIN A, et al. Network Support for IP Traceback[J]. IEEE/ACM Transaction on Networking, 2001, 9(3): 226-237.
  • 2BELENKY A, ANSARI N. IP Traceback with Deterministic Packet Marking[J]. IEEE Comm. Letter, 2003, 7(4): 162-164.
  • 3BELENKY A, ANSARI N. On Deterministic Packet Marking[J] Computer Networks, 2007, 51(10): 2677-2700.
  • 4胡长俊.概率包标记技术综述[J].通信技术,2009,42(2):267-269. 被引量:5
  • 5PARK K, HEEJO L. On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack[C]//Proc. of IEEE INFOCOM. Anchorage, Alaska: [s.n.l, 2001: 338-347.
  • 6FENG Bo, GUO Fan, YU Min. Dynamic Probabilistic Packe1Marking Based On PPM[C]//Proceedings of Second Pacific-Asia Conference on Web Mining and Web-based Application. Wuhan, China: [s.n.], 2009: 289-292.
  • 7SONG D X, PERRIG A. Advanced and Authenticated Marking Schemes for IP Traceback[C]//Proceedingsof IEEE INFOCOM, IEEE Press. Anchorage, Alaska: [s.n.], 2001 : $78-886.
  • 8王乃卫,郑慧英.针对DoS攻击的IP跟踪技术研究[J].信息安全与通信保密,2012,10(1):103-105. 被引量:5
  • 9梁晓初,孙伟.基于认证的DDos攻击源追踪改进方案[J].信息安全与通信保密,2007,29(8):100-102. 被引量:1
  • 10PENG T, LECKI C, KOTAGIRI R. Adjusted Probabilistic Packet Marking[C]//Proc. of the Second IFIP Networking Conference. Pisa, Italy: [s.n.], 2002: 697-708.

二级参考文献20

共引文献7

同被引文献14

  • 1CHANG H Y, NARAYAN R, WU S F. DEC1 DUOUS: Decentralized Source Identification for Network- based Intrusions[C]. in Proceedings of the Sixth IFIP/ IEEE International Symposium on Integrated Network Management, 1999: 701-714.
  • 2BELLOVIN S. 1CMP Traceback Message[S]. IETF Internet Draft draft-ietf-itrace-04.txt, Feb 2003.
  • 3BELENKY A, ANSARI N. IP Tracehack with Deterministic Packet Marking[J]. IEEE Communications Letters, 2003, 7(4): 162-164.
  • 4SNOEREN A C, CRAIG P, SANCHEZ L A. Hash-Based IP Traceback[D]. BBN Technologies, 10 Moulton Street, Cambridge, MA 02138, 2001.
  • 5BLOOM B H. Space/Time Trade-offs in Hash Coding with Allowable Errors[J]. Communications of the ACM, 1970, 13: 422-426.
  • 6YAN D, WANG Y L, SU S. A Precise and Practical IP Traceback Technique Based on Packet Marking and Logging[J]. Journal of Information Science and Engineering, 2012(28) : 453-470.
  • 7CHANG H Y, NARAYAN R, WU S F. Deciduous:De- centralized Source Identification for Network-based Intru- sions[ C ]//Proceedings of the Sixth IFIP. Boston: IEEE International Symposium on Integrated Network Manage- ment, 1999:701-714.
  • 8ALEX C, CRAIG P, LUIS A,et al. Hash-Based IP Tra- ceback [ D ]. Britain : Cambridge, 2001:401-407.
  • 9BLOOM B H. Space/Time Trade-Offsin Hash Coding- with Allowable Errors [J]. Communications of the ACM, 1970,13 ( 07 ) :422-426.
  • 10BELLOVIN S, LEECH M, TAYLOR T. ICMP Traceback Message[ S ]. Internet Draft, California: IETF, 2003 : 112-125.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部