期刊文献+

一种分层的IP追踪系统架构

A Hierarchical IP Traceback Architecture
原文传递
导出
摘要 由于不同的自治域在网络拓扑、经济实力、技术储备、组织规章等多方面具有不同的特点,自治域的管理者希望能在多种IP追踪技术中选择最适合的一种。文中提出一种分层的IP追踪系统架构,将IP追踪系统分为跨域追踪层、域内追踪层和设备追踪层,由域内追踪层将本域内的追踪结果封装处理成统一的格式,使得不同的自治域可以采用不同的IP追踪技术,在此基础上,提出并行追踪技术和有序路径重构技术,提高了追踪的成功率。 As different autonomous systems have different characteristics in network topology, economic strength, technical reserves and regulations. Managers of these autonomous systems nsually want to choose the most appropriate ones from various IP traceback technologies. This paper describes a hierarchical IP traceback system architecture, in which the IP traceback system is divided into three layers: cross-domain traceback layer, intra-domain traceback layer and device traceback layer. Intra-domain traceback layer wrap the traceback results into a unified format, so that different autonomous domains can use different IP traceback technologies. On this basis, this paper proposes a parallel path traceback technology and orderly reconstruction technology to improve the traceback success rate.
出处 《信息安全与通信保密》 2013年第10期79-81,共3页 Information Security and Communications Privacy
关键词 追踪系统 分层架构 并行追踪 有序路径重构 traceback hierarchical parallel reconstruct
  • 相关文献

参考文献9

  • 1CHANG H Y, NARAYAN R, WU S F. DEC1 DUOUS: Decentralized Source Identification for Network- based Intrusions[C]. in Proceedings of the Sixth IFIP/ IEEE International Symposium on Integrated Network Management, 1999: 701-714.
  • 2BELLOVIN S. 1CMP Traceback Message[S]. IETF Internet Draft draft-ietf-itrace-04.txt, Feb 2003.
  • 3胡长俊.概率包标记技术综述[J].通信技术,2009,42(2):267-269. 被引量:5
  • 4BELENKY A, ANSARI N. IP Tracehack with Deterministic Packet Marking[J]. IEEE Communications Letters, 2003, 7(4): 162-164.
  • 5刘红,陈秀真,严庆蕾.基于动态概率的多条标记IP追踪方法[J].信息安全与通信保密,2013,11(3):66-69. 被引量:2
  • 6SNOEREN A C, CRAIG P, SANCHEZ L A. Hash-Based IP Traceback[D]. BBN Technologies, 10 Moulton Street, Cambridge, MA 02138, 2001.
  • 7BLOOM B H. Space/Time Trade-offs in Hash Coding with Allowable Errors[J]. Communications of the ACM, 1970, 13: 422-426.
  • 8YAN D, WANG Y L, SU S. A Precise and Practical IP Traceback Technique Based on Packet Marking and Logging[J]. Journal of Information Science and Engineering, 2012(28) : 453-470.
  • 9王乃卫,郑慧英.针对DoS攻击的IP跟踪技术研究[J].信息安全与通信保密,2012,10(1):103-105. 被引量:5

二级参考文献29

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部