期刊文献+

基于代理的IP包源追踪系统 被引量:3

Proxy-based IP Traceback System
下载PDF
导出
摘要 提出了一种不需要ISP合作的基于代理的IP包源追查体系结构,描述了支持这种体系结构的分布式包记录代理服务器和集中式反向追查安全控制服务器的实现步骤,扩充了UnixIP包转发算法,实现了包摘要算法和自动追查系统,解决了诸如可疑包的识别、记载、追踪的安全性,节省路由器资源·通过仿真实验证明基于代理的IP包追踪方法是行之有效的· A new technique was presented to trace spoofed packets back to their actual source host without relying on the cooperation of intervening ISPs. An agentbased distributed architecture for tracing suspicious IP packets was outlined. An agent server was designed to record packet digests,and a security control server was designed to traceback the originator of a spoofing IP packet. The arithmetic forwarding IP packet in Unix OS was expanded. The packet digest arithmetic and the agentbased automatic tracing system were realized. The methods for identifying suspicious packets and recording packet digest were tested through the simulation experiments. The agentbased method of tracing IP packet is feasible.
作者 王翠荣 高远
出处 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2003年第7期662-665,共4页 Journal of Northeastern University(Natural Science)
基金 国家自然科学基金资助项目(60073059).
关键词 拒绝服务攻击 IP地址欺骗 IP包摘要 IP包追踪 UNIX 包转发算法 代理 DoS attacking IP address spoofing IP packet digest IP packet tracebacking Unix packet forwarding agent
  • 相关文献

参考文献10

  • 1王丽娜,董晓梅,于戈,王东.基于进化神经网络的入侵检测方法[J].东北大学学报(自然科学版),2002,23(2):107-110. 被引量:20
  • 2Savage S, Wetherall D. Practical network support for IP traceback[A]. Proceedings of the 2000 ACM SIGCOMM Conference[C]. New York:ACM Press, 2000.295- 306.
  • 3Howard J. An analysis of security incidents on the Internet[D]. Pittsburgh:Carnegie Mellon University, 1998.
  • 4Song X D, Perrig A. Advanced and authenticated marking schemes for IP traceback[A]. IEEE INFOCOM[C]. New York:ACM Press, 2001. 878 - 886.
  • 5Krawczyk H. LFSR-based hashing and authentication[A].Proceedings Advances in Cryptology [C]. Santa Barbara:Springer, 1994. 129- 139.
  • 6IETF 1981 RFC 792, ICMP-Internet control message protocol[S].
  • 7Mankin A, Massey D. On design and evaluation of ' intention-driven' ICMP traceback[A]. Proceedings of 10th IEEE Conference on Computer Communications and ,Networks[C]. New York: IEEE Standards Office, 2001. 159- 165.
  • 8Stoica I, Zhang H. Providing guaranteed services without per flow management[A]. Proceedings of ACM SIGCOMM'99[C]. Boston:MA, 1999.81-94.
  • 9Alex C. Hash-based IP traceback[A]. ACM SIGCOMM'01[C]. San Diego:ACM Press, 2001.3- 14.
  • 10Duffield N, Grossglauser M. Trajectory sampling for direct traffic observation [J ]. Computer Communication Review,2000, (30) :271 - 282.

二级参考文献3

共引文献19

同被引文献19

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部