期刊文献+

基于自适应包标记的RDDoS攻击溯源技术研究

RDDoS Attack Source- Tracing Technology based on Self-Adaptive Packet-Marking
下载PDF
导出
摘要 针对RDDoS攻击溯源问题,在包标记技术的基础上,提出了一种自适应的标记算法。通过动态调整标记概率,较好地解决了算法收敛速度和路由器负载问题,并针对传统包标记算法只能对DDoS攻击进行溯源的问题,设计了一种反射标记算法,使包标记技术能应用于RDDoS攻击溯源,最后对算法进行了理论分析及模拟研究,通过与经典包标记算法和动态包标记算法进行对比,验证了其良好的性能。 Aiming at the source tracing of RDDoS attack, a self-adaptive algorithm based on package- marking technology is proposed. By dynamically adjusting marking probability, convergence speed of the algorithm and payload of the router are fairly solved. Traditional packet-marking algorithm can only trace the source of DDoS attacks, and in light of this, a reflective marker algorithm is proposed and designed, thus enabling the package-marking technique to be applied in the source tracin~ of RDDoS attack.
作者 孙鹏 吴庆
机构地区 中国人民解放军
出处 《通信技术》 2015年第4期478-483,共6页 Communications Technology
关键词 RDDoS 包标记 溯源 RDDoS package-marking source tracing
  • 相关文献

参考文献7

  • 1Burch H, Cheswick B. Tracing Anonymous Packets to their Approximate Source [ C ]. Proceedings of the 14th Conference on Systems Administration, 2000 LISA XIV, New Orleans, I uisiana, USA, 2000.
  • 2Stefan Savage, David Wetherall, Anna Karlin, et al. Network Support for IP Traceback[ J]. IEEFJACM Tran- son Networking, 2001, 9 (5) :226-257.
  • 3Liu Jenshiuh, Zhi Jianlee, Chung Yehching. Dynamic Probabilistic Packet Marking for Efficient IP Traceback [ J ]. Computer Networks, 2007, 51:866-882.
  • 4Song D, Perring A. Advanced and Authenticated Marking Schemes for IP traceback [ C ]. Anchorage, Proceedings of IEEE INFOCOM, Alaska USA, 2001 , 2: 878-886.
  • 5Broder A, Mitzenmacher M. Network Applications of Bloom Filters: A survey [ J ]. Internet Mathematics, 2005,1 (4) :485-509.
  • 6Stoica I, Zhang H. Providing Guaranteed Services Without Per Flow Management. In:Proceedings of the 1999 ACM SIGCOMM Conference,pages 81-94,Boston,MA,Aug. 1999.
  • 7郝尧,陈周国,蒲石,黄宸.多源网络攻击追踪溯源技术研究[J].通信技术,2013,46(12):77-81. 被引量:8

二级参考文献10

  • 1陈周国,蒲石,祝世雄.匿名网络追踪溯源综述[J].计算机研究与发展,2012,49(S2):111-117. 被引量:14
  • 2BELLOVIN S M, LEECH M, TAYLOR T. ICMP Traceback Messages [ EB/OL ]. [ 2013-11 - 18 ]. http ://academiccom- mons. columbia, edu/download/fedora _ content/download/ ac : 127254/CONTENT/draft-ietf-itrace-04. txt. pdf.
  • 3SNOEREN A C, PARTRIDGE C, SANCHEZ L A, et al. Hash-based IP Traceback [ C ]//Proceedings of the 2001 Conference on Applications, Technologies, Architec- tures, and Protocols for Computer Communications. San Diego, California, USA: ACM, 2001: 3-14.
  • 4KIYAVASH N, HOUMANSADR A, BORISOV N. Multi Flow Attacks Against Network Flow Watermarking Schemes[ C l// Proceedings of 17th USENIX Security. San Jose : USENIX Association, 2008:307-320.
  • 5CHAO Gong, SARAC K. A More Practical Approach for Single Packet IP Traceback Using Packet Logging and Marking[ J]. IEEE Transactions on Parallel and Distribu- ted Systems,2008, 19(10) : 1310-1324.
  • 6占勇军,谢冬青,周再红,罗莉莉.IPv6下基于改进的SPIE源追踪方案[J].计算机工程与科学,2007,29(4):11-13. 被引量:5
  • 7胡长俊.概率包标记技术综述[J].通信技术,2009,42(2):267-269. 被引量:5
  • 8陈周国,蒲石,祝世雄.一种通用的互联网追踪溯源技术框架[J].计算机系统应用,2012,21(9):166-170. 被引量:9
  • 9闫巧,雷琼钰.IP追踪新进展[J].小型微型计算机系统,2012,33(9):2027-2032. 被引量:4
  • 10朱田,田野,马迪,毛伟.基于包验证的面向IPv6翻译机制的IP追溯方法[J].计算机应用,2013,33(4):926-930. 被引量:3

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部