期刊文献+

流身份鉴别技术研究进展 被引量:1

Survey of network flow identification technology
下载PDF
导出
摘要 由于流交换中流源身份的不可信、流交换范围的不可控和流路径的不可追踪问题与日俱增,流身份鉴别技术逐渐成为近年来网络安全研究的热点。为了更深入地解决流身份鉴别技术存在的不足,采用文献分析方法论证了必要性,简述了其应用领域,介绍了相关概念和基本框架;概括了流身份鉴别技术面临的关键问题——流变换,并且多维度地将现有方案进行分类,从多个角度进行对比分析。最后归纳了该领域当前的热点和发展前景,以期为下一步研究提供参考。 Because of the increasing number of untrusted flow identity problem, uncontrolled flow exchanging problem and un- traceable flow path problem, network flow identification technology has become the hot spot in the study of network security in recent years. To find deficiencies of the existing flow identification technology, this paper firstly briefly introduced the necessi- ty, application fields, related concepts and basic framework by using literature analysis method. Besides, it discussed the key problem: flow transformation, of network flow identification technology. What' s more, it' s the first time to divide current schemes into several categories. It concluded typical schemes in comparison multidimensional of each class. Finally, it pointed out the existing problems so as to providing reference for further research.
出处 《计算机应用研究》 CSCD 北大核心 2013年第10期2891-2895,2902,共6页 Application Research of Computers
关键词 流交换 流身份鉴别 追踪 匿名通信 跳板 network flow exchange flow identity recognition track anonymous communication stepping stone
  • 相关文献

参考文献49

  • 1方滨兴,崔翔,王威.僵尸网络综述[J].计算机研究与发展,2011,48(8):1315-1331. 被引量:63
  • 2YLONEN T,LONVICK C. RFC 4251,the secure shell (SSH) proto-col architecture [ S]. 2006.
  • 3SULTANA S,BERTINO E,SHEHAB M. A provenance based mech-anism to identify malicious packet dropping adversaries in sensor net-works[C]//Proc of the 31st International Conference on DistributedComputing Systems. Washington DC : IEEE Computer Society,2011 :332-338.
  • 4AGGARWAL C C. Data streams: models and algorithms [ M]. NewYork :Springer-Verlag,2007 :79.
  • 5CALLADO A, KAMIENSKI C, SZABO G,et al. A survey on inter-net traffic identification [ J]. IEEE Communications Surveys&Tutorials, 2009,11(3) :37-52.
  • 6MUTHUKRISHNAN S. Data streams: algorithms and applications[M]. Foundations and Trends in Theoretical Computer Science. [ S.1.] ;Novf Publishers Inc ,2005 :117.
  • 7WHITMAN M E,MATTORD H J. Principles of information security[M]. [ S. 1.] : Cengage Learning,2011 : 135.
  • 8WANG Xin-yuan, RAMSBROCK D. Botmaster traceback: U. S.,13/441,076[P]. 2012-04-06.
  • 9FREEDMAN M J, MORRIS R. Tarzan: a peer-to-peer anonymizingnetwork layer [ C] //Proc of the 9th ACM Conference on Computer andCommunications Security. New York: ACM Press,2002 : 193-206.
  • 10FU Xin-wen, GRAHAM B, BETTATI R, et al. On countermeasuresto traffic analysis attacks [ C]//Proc of IEEE Information AssuranceWorkshop. 2003:188-195.

二级参考文献67

  • 1YongZhang,HongZhu.Approximation Algorithm for Weighted Weak Vertex Cover[J].Journal of Computer Science & Technology,2004,19(6):782-786. 被引量:5
  • 2蔡志平,殷建平,刘湘辉,刘芳,吕绍和.链路约束的分布式网络监测模型[J].计算机研究与发展,2006,43(4):601-606. 被引量:2
  • 3Porras P, Saidi H, Yegneswaran V. A foray into Conficker's logic and rendezvous points [R/OL]. Berkeley, CA: USENIX, 2009. [2011-06-10]. http://www, usenix, org/ events/leet09/tech/full papers/porras/porras_html/.
  • 4CNCERT.中国互联网网络安全报告[EB/OL].2011.[201-06-10].http://www.cert.org.cn/UserFiles/File/2010%20first%20half.pdf.2010.
  • 5Symantec Inc. Symantec global Internet security threat report trends for 2009 volume XV [EB/OL]. 2010. E2011 06-101. http://eval, symantee, com/mktginfo/enterprise/white_ papers/b-whitepaper_internet security threat report xv 04 2010. en-us, pdf.
  • 6Holz T, Gorecki C, Rieck C, et al. Detection and mitigation of fast-flux service networks [C] //Proc of the 15th Annual Network and Distributed System Security Symposium. Berkeley, CA: USENIX, 2008.
  • 7Stone-Gross B, Cova M, Cavallaro L, et al. Your botnet is my botnet: Analysis of a botnet takeover[C] //Proc of the 16th ACM Conf on Computer and Communications Security. New York: ACM, 2009:635-647.
  • 8Cui Xiang, Fang Towards advanced Usenix Workshop Threats. Berkeley, Binxing, Yin Lihua, et al. Andbot: mobile bomets [C] //Proc of the 4th on Large-scale Exploits and Emergent CA: USENIX, 2011:No 11.
  • 9Wang P, Sparks S, Zou C C. An advanced hybrid peer-topeer botnet [C] //Proc of the 1st Conf on 1st Workshop on Hot Topics in Understanding Botnets. Berkeley, CA: USENIX, 2007: No 2.
  • 10Holz T, Steiner M, Dahl F, et al. Measurements an mitigation of peer-to peer-based botnets:A case study o storm worm [C] //Proc of the 1st USENIX Workshop o Large-scale Exploits and Emergent Threats. Berkeley, CA USENIX, 2008: No 9.

共引文献76

同被引文献20

  • 1彭飞,丘水生,龙敏.基于二维超混沌映射的单向Hash函数构造[J].物理学报,2005,54(10):4562-4568. 被引量:26
  • 2周昆.一种基于 Honeyd 的过程控制蜜罐系统的平台搭建研究[D].上海=华东理工大学,2014.
  • 3Gheng L,Hongqi Z.Real-time stepping stone detection based on RTT[C]//Proceedings of 2013 Third Interna- tional Conference on Instrumentation,Measurement,Com- puter,Communication and Control(IMCCC).New York:IEEE,2013:85-89.
  • 4Singh H,Kaur L,Singh K.Fractional M-band dual tree complex wavelet transform for digital watermarking[J].Sadhana,2014,39(2):345-361.
  • 5GhoshP,Ghosh R,Sinha S,et al.A novel digital water- marking technique for video copyright protection[J].Computer Science and Information Technology,2012:601-609.
  • 6WuK,Yan W,Du J.A robust dual digitai-image water- marking technique[C]//Proceedings of International Con- ference on Computational Intelligence and Security Work- shops.New York:IEEE,2007:668-671.
  • 7Kabi K K,Saha B J,Pradhan C.Enhanced digital water- marking scheme using fractal images in wavelets[C]// Proceedings of 2014 International Conference on Compu- ting,Communication and Networking Technologies(IC- CCNT).New York:IEEE,2014:1-6.
  • 8Sachnev V,Kim H J,Nam J,et al.Reversible watermark- ing algorithm using sorting and prediction[J].IEEE Transactions on Circuits and Systems for Video Technolo- gy,2009,19(7):989-999.
  • 9Qu Z,Jin C.Self-restoring dual watermarking technology [C]//Proceedings of IEEE International Conference on System of Systems Engineering.New York:IEEE,2007:1-5.
  • 10Frattolillo F.Web-oriented nonblind image watermarking procedure[J].Journal of Electronic Imaging,2006,15(3):033011-033011-14.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部