期刊文献+

无线自组织网络中DDoS攻击源追踪技术研究综述 被引量:1

SURVEY OF RESEARCHES ON TRACEBACK TECHNIQUES AGAINST DDOS ATTACKS IN WIRELESS AD HOC NETWORKS
下载PDF
导出
摘要 无线自组织网络因其自身特点比传统的有线网络更容易遭受拒绝服务攻击。攻击源追踪技术是抵御分布式拒绝服务(DDoS)的一种重要方法,这种技术得到了研究者的广泛关注,成为了一个热点研究问题。但是,目前无线自组织网络中大部分的研究工作都是Internet已有方法的移植,有很大的局限性。将目前无线自组织网络中攻击源追踪技术的研究现状进行分类和介绍,并分析了自组织网络中追踪面临的挑战以及未来的研究发展方向。 Wireless Ad hoe network is more vulnerable to DDoS attack than wired network for its Characteristics. IP traeeback is one of the important techniques to defend DDoS attack, which has attracted wide attention and becomes the focus of the research. However, most of the researches in regard to wireless Ad hoc network are based on transplanting the existing Internet IP traceback approaches, and have great limitation. In this paper we classify and introduce current researching status of IP traceback technologies in wireless Ad hoc network, analyse the challenges the traceback encountered in Ad hoc network, and point out the development direction of future researches.
出处 《计算机应用与软件》 CSCD 北大核心 2013年第9期191-193,218,共4页 Computer Applications and Software
关键词 无线自组织网络 分布式拒绝服务攻击 攻击源追踪技术 Wireless Ad hoc Network DDoS attack IP traceback
  • 相关文献

参考文献41

  • 1Hao Yang,Haiyun Luo,Fan Ye,et al. Security in Mobile Ad Hoc Net-works :Challenges and Solutions[ J]. IEEE Wireless Communications,2004,11(1) : 38-47.
  • 2Moore D, Voelker G, Savage S. Inferring Internet denial-of-service ac-tivity [C]//The 10th ACM USENIX Security Symposium . USA:ACM,2002 :9-22.
  • 3Aad I,Hubaux J P,Knightly E. Impact of Denial of Service Attacks onAd Hoc Networks [ J]. IEEE/ACM Transactions on Networking, 2008 ,16(4) :791 -802.
  • 4易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 5任伟,刘腾红,金海.移动Ad Hoc网络中针对拥塞的RoQ DDoS攻击及其防御[J].计算机研究与发展,2006,43(11):1927-1932. 被引量:6
  • 6Yinan Jing, Xueping Wang, Xiaochun Xiao, et al. Defending AgainstMeek DDoS Attacks By IP Traceback-based Rate Limiting [ C] //No-vember 2006,49th GLOBECOM 2006, San Francisco.
  • 7夏春和,王海泉,吴震,王继伟.攻击源定位问题的研究[J].计算机研究与发展,2003,40(7):1021-1027. 被引量:16
  • 8Stone R. CenterTrack. An IP Overlay Network for Tracking DoS Floods[C]//Proceedings of the 2000 USENIX Security Symposium.Denver: 2000.
  • 9Alex C Snoeren, Craig Partridge, Luis A Sanchez, et al. Hash-based IPtraceback [ C] //Proceedings of the 2001 ACM SIGCOMM Conference.California: August 2001.
  • 10Tsemhuei Lee, Weikai Wu,Tze-Yau, William Huang. Scalable packet di-gesting schemes for IP traceback [ C J//IEEE International Conference onCommunications (ICC 2004). 2004- : 1008 - 1013.

二级参考文献113

  • 1况晓辉,朱培栋,卢锡城.移动自组网络分布式组密钥更新算法[J].软件学报,2004,15(5):757-766. 被引量:18
  • 2李德全,徐一丁,苏璞睿,冯登国.IP追踪中的自适应包标记[J].电子学报,2004,32(8):1334-1337. 被引量:33
  • 3周明天 汪文勇.TCP/IP网络原理与技术[M].北京:清华大学出版社,1999..
  • 4A Perrig, J Stankovic, D Wagner. Security in wireless sensor networks[J]. Communications of the ACM, 2004,47 (6) : 53 - 57.
  • 5F Ye,H Luo,S Lu,L Zhang. Statistical en-route filtering of injected false data in sensor networks[ J]. IEEE Journal on Selected Areas in Communication, 2005,23 (4) : 839 - 850.
  • 6S Zhu, S Jajodia, P Ning. An interleaved hop-by-hop authentication scheme for fdtering of injected false data in sensor net- works[A]. In Proc. IEEE Symposium on Security and Privacy' 04 [ C ]. California: Los Alamitos, Calif, 2004.259 - 271.
  • 7L Gather. Denial-of-service attacks rip the intemet[ J]. Computer,2000,33(4) : 12 - 17.
  • 8H Butch, B cheswick. Tracing anonymous packets to their approximate source[ A]. In Proc. USENIX Conference on System administration' 00[ C ]. Berkley, California, USA: USENIX Association, 2000.319 - 327.
  • 9G Sager. Security fun with OCxmon and cflowd[ OL]. http:// www. caida, org/funding/ngi/content/security/1198/mt0000. htm.
  • 10S Savage, D Wethemll, A Karlin, T. Anderson. Practical network support for IP traceback[A]. In Proc. ACM SIGCOMM' 00[C]. New York, USA: ACM NY, USA, 2000: 295 - 306.

共引文献111

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部