期刊文献+

Discovering Attack Path Oriented-IP Traceback 被引量:1

Discovering Attack Path Oriented-IP Traceback
下载PDF
导出
摘要 The technique of IP traceback may effectively block DOS (Denial Of Service) and meet the requirement of the computer forensic, but its accuracy depends upon that condition that each node in the Internet must support IP packet marking or detected agents. So far, this requirement is not satisfied. On the basis of traditional traceroute,this paper investigates the efficiency of discovering path methods from aspects of the size and order of detecting packets, and the length of paths.It points out that the size of padding in probed packets has a slight effect on discovering latency, and the latency with the method of bulk sending receiving is much smaller than one with the traditional traceroute. Moreover, the loss rate of packets with the technique of TTL (Time To Live) which increases monotonously is less than that with the technique of TTL which decreases monotonously. Lastly,OS (Operating System) passive fingerprint is used as heuristic to predict the length of the discovered path so as to reduce disturbance in network traffic. The technique of IP traceback may effectively block DOS (Denial Of Service) and meet the requirement of the computer forensic, but its accuracy depends upon that condition that each node in the Internet must support IP packet marking or detected agents. So far, this requirement is not satisfied. On the basis of traditional traceroute,this paper investigates the efficiency of discovering path methods from aspects of the size and order of detecting packets, and the length of paths.It points out that the size of padding in probed packets has a slight effect on discovering latency, and the latency with the method of bulk sending receiving is much smaller than one with the traditional traceroute. Moreover, the loss rate of packets with the technique of TTL (Time To Live) which increases monotonously is less than that with the technique of TTL which decreases monotonously. Lastly,OS (Operating System) passive fingerprint is used as heuristic to predict the length of the discovered path so as to reduce disturbance in network traffic.
出处 《High Technology Letters》 EI CAS 2003年第4期56-60,共5页 高技术通讯(英文版)
基金 SupportedbytheNationalNaturalScienceFoundationofChinaandHBNSF
关键词 IP技术 互联网 操作系统 TTL技术 TCP/IP协议 IP traceback, network performance measurement,path discovering, network Security
  • 相关文献

参考文献4

  • 1Govindan R,Tangmunarunkit H.Heuristics for Internet map discovery[]..2000
  • 2Govindan R,Paxson V.Estimating router ICMP generation delays[]..2002
  • 3Malkin G.RFC1393[].JANAC.1993
  • 4Reynolds J,Postel J.RFC1700[].October.1994

同被引文献2

  • 1VisualRoute[Z].http://www.visualware.com/visualroute/index.html.
  • 2Honeynet Project[Z].http://project.honeynet.org/.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部