期刊文献+

基于边采样包标记的IP源回溯系统 被引量:1

IP Traceback System with Edge Sampling and Packet Marking
下载PDF
导出
摘要 分析了一个基于边采样包标记的IP源回溯系统方案 ,给出了该方案的软件实现流程图和模拟程序 ,以确定网络攻击的真正来源 。 IP traceback solutions, such as ingress filtering, linking test, etc, can protect network from DDoS(Distributed Denial-of-Service)attacks. After analysing their principles and characteristics, a 'edge sample' based IP traceback system is pretended here. Its data flow and simulation program are also given.
作者 陆庆 周世杰
出处 《计算机应用》 CSCD 北大核心 2003年第3期21-23,共3页 journal of Computer Applications
基金 四川省科技厅重点科技项目 (0 1GG0 71 2 )
  • 相关文献

参考文献8

  • 1[1]Cisco Systems. Configuring tcp intercept (prevent denial-of-service attacks)[Z]. Cisco IOS Documentation, 1997.
  • 2[2]Internet mapping[EB/OL]. http://cm.bell-labs.com/who/ches/map/dbs/index.html, 1999.
  • 3[3]Cisco. Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks[EB/OL]. http://www.cisco.com, 2000-02-17.
  • 4[4]Bellovin SM. ICMP Traceback Messages[R]. AT&T Labs Research,2000.
  • 5[5]Savage S, Wetherall D,Karlin A, et al. Practical network support for ip traceback[A]. Proceedings of the 2000 ACM SIGCOMM Conference[C], 2000.
  • 6[6]Song DX, Perrig A. Advanced and Authenticated Marking Schemes for IP Traceback[A]. IEEE forum[C],2001.
  • 7[7]Peng T, Leckie C, Kotagiri R. Adjusted Probabilistic Packet Marking for IP Traceback [A]. LNCS 2345[C], 2002. 697.
  • 8[8]Rivest RL. The MD5 Message Digest Algorithm[S]. RFC 1321, April 1992.

同被引文献7

  • 1Stefan Savage,David Wetherall,Anna Karlin,et al.Practical network support for IP traceback[J].IEEE/ACM Transaction on Networking,2001,9(3):226-237.
  • 2Kihong Park,Heejo Lee.On the effectiveness of route-based packet filtering for distributed DOS attack prevention in power-law internets[J].Computer Communication Review,2001,31 (4):15-26.
  • 3Drew Dean,Adam Stubblefield.An algebraic approach to IP traceback[J].ACM Transactions on Information and System Security,2002,5(2):119-137.
  • 4Lance Spitzner.The Honeynet project:Trapping the Hackers[J].IEEE Security and Privacy,2003,1 (2):15-23.
  • 5Alex C Snoeren,Craig Partridge.Hash-based IP traceback[J].Computer Communication Review,2001,31 (4):3-14.
  • 6刘宝旭,许榕生.主动型安全防护措施-陷阱网络的研究与设计[J].计算机工程,2002,28(12):9-11. 被引量:24
  • 7董玲,陈一民.使用带认证的入口包标记追踪IP源地址[J].计算机工程与科学,2004,26(4):11-14. 被引量:1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部