期刊文献+

基于ICMP、UDP、TCP协议的分布式IP级拓扑探测方法 被引量:5

Distributed IP-Level Topology Detection Method based on ICMP,UDP and TCP Protocols
下载PDF
导出
摘要 网络拓扑测量是认识、研究网络空间的基础,因此研究网络拓扑测量技术具有重要意义。随着安全防范意识的提高,基于传统方式的探测手段会导致拓扑中存在大量的匿名路由器,降低拓扑完整性。针对该问题,提出了一种基于Traceroute、ICMP、UDP、TCP协议的分布式IP级互联网拓扑探测方法。该方法通过在全球范围内部署的分布式探测节点和多种协议组合的方式,不仅能够加快探测速度,而且能最大限度地减少匿名节点的数量,进一步扩充和加强拓扑图,使获得的拓扑图更接近实际。 Network topology measurement is the basis for understanding and exploring cyberspace. Therefore, the research on network topology measurement technology is of great significance. With the improvement of security awareness, the detection means based on traditional methods would lead to a large number of anonymous touters in the topology and the reduction of topology integrity. Aiming at this problem, a distributed IP-level Internet topology detection method based on Traceroute, ICMP, UDP and TCP protocols is proposed. This method could speed up the detection speed and minimize the number of anonymous nodes via the distributed probe nodes and multiple protocols combination on a global scale. Further expansion and enhancement of the topology map would make the obtained topology map closer to the reality.
作者 张江 孙治 段梦军 吴佑珂 ZHANG Jiang;SUN Zhi;DUAN Meng-jun;WU You-ke(Cyberspace Security Key Laboratory of Sichuan Province,Chengdu Sichuan 610041,China;Cyberspace Security Technology Laboratory of CETC,Chengdu Sichuan 610041,China;China Electronic Technology Cyber Security Co.Ltd.,Chengdu Sichuan 610041,China)
出处 《通信技术》 2018年第11期2645-2649,共5页 Communications Technology
基金 国家科技部重点研发计划(No.2016YFB0801302)~~
关键词 TRACEROUTE 分布式 拓扑探测 匿名节点 Traceroute distributed topology probe anonymous node
  • 相关文献

参考文献2

二级参考文献19

  • 1Lakhina A,Byers J,CroveUa M,et al.Sampling biases in IP topology measurements[C]//IEEE INFOCOM 2003.San Francisco:IEEE, 2003,1:332-341.
  • 2Clauset A,Moore C.Traceroute sampling makes random graphs appear to have power law degree distributions.eprint arXiv:condmat/0312674,2003.
  • 3Achlioptas D,Clauset A,Kempe D,et al.On the bias of traceroute sampling,or:Why almost every network looks like it has a power law[C]//ACM Symposium on Theory of Computing,2005:694-703.
  • 4Dall'Asta L,Alvarez-Hamelin J I,Barrat A,et al.A statistical approach to the traeeroute-like exploration of networks:theory and simulations[C]//Workshop on Combinatorial and Algorithmic Aspects of Networking,2004:140-153.
  • 5Guillaume J L,Latapy M.Relevance of massively distributed explorations of the Intemet topology:Simulation results[C]//IEEE Infocom 2005,2005,2:1084-1094.
  • 6Barabasi A L,Albert R.Emergence of scaling in random networks[J]. Science, 1999,286(5439) : 509-512.
  • 7Dorogovtsev S N,Mendes J F F.Evolution of networks[J].Adv Phys, 2002,51 : 1079-1187.
  • 8Guillaume J-L,Latapy M.Bipartite structure of all complex networks[J].Information Processing Letters,2004,90(5):215-221.
  • 9Sagy B,Mira G,Avishai W.An incremental super-linear preferential Internet topology model[C]//LNCS 3015:Prec 5th Annual Passive and Active Measurement Workshop,2004:53-62.
  • 10Haddadi H,Iannaecone G.Network topologies: Inference,modelling and teneration[J].IEEE Communications Surveys and Tutorials, 2008,10(2) :48-69.

共引文献109

同被引文献32

引证文献5

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部