期刊文献+

匿名技术的抗攻击性研究 被引量:5

Anonymous communications for attack-resistant
下载PDF
导出
摘要 研究了匿名技术的抗攻击性问题,定义了基于重路由的匿名通信系统模型,对匿名技术可能受到的攻击进行了分类和定义,分为消息码攻击、消息长度攻击、重放攻击、合伙攻击、泛洪攻击、消息量攻击、时间攻击、侧面攻击等8种,并对现有的主要匿名技术在抵抗攻击性方面进行了研究,为匿名技术的研究和设计新的匿名系统提供了依据. An anonymity concept is introduced, and an anonymous communication system is defined on the basis of host-based rerouting mechanism and the attacks which anonymous communications suffer possibly, such as message coding attack, message length attack, replay attack, collusion attack, flooding attack, message volume attack, timing attack and profiling attack. Lastly, the attack(-resistant) main anonymity technologies are compared in order to give a basic idea to select and design an anonymous communication.
作者 吴振强
出处 《陕西师范大学学报(自然科学版)》 CAS CSCD 北大核心 2004年第1期29-32,共4页 Journal of Shaanxi Normal University:Natural Science Edition
基金 国家863计划资助项目(2002AA144010) 陕西师范大学青年基金资助项目(995047)
关键词 抗攻击性 重路由 网络安全 匿名通信 network security anonymous communication rerouting attack MR Subject Classification: 94A60
  • 相关文献

参考文献4

二级参考文献18

  • 1[1]The anonymizer[EB/OL].http://www.anonymizer.com.
  • 2[2]MICHAEL K,AVIEL A,RUBIN D.Crowd:Anonymity for Web transcations[EB/OL].http://www.research.att.com/ projects/ crowds/papers/j8.pdf.
  • 3[3]REED M G,SYVERSON P F.Anonymous connections and onion routing[J].IEEE Journal on Selected Areas in Communication- Special Issue on Copyright and Privacy Protection,1998,16(4):482-494.
  • 4[4]GOLDSCHLAG D M,REED M G,SYVERSON P F.Hiding routing information[A].Information Hiding,Proceedings[c].Springer Verlag,LNCS,1996.1174:137-150.
  • 5[5]HOWARD J D.An analysis of security incidents on the internet [D].Camegie Mellon University,1988.
  • 6[6]SAVAGE S,WETHERALL D,KARLIN A.Practical network support for IP traceback[A].Proceedings of the 2000 ACM SIGCOMM Conference[C].August 2000.
  • 7[7]SONG D X,PERRIG A.Advanced and authenticated marking schemes for IP traceback[R].California: Computer Science Division (EECS),University of California,2000.
  • 8[8]Computer Emergency Response Team.Cert advisory CA-96.26 denial-of-service attack via pings[EB/OL].http://www.cert.org/ advisories/CA-96.26.ping.html,1996-11.
  • 9[9]Computer Emergency Response Team.Cert advisory ca-2000-01 denial-of-service developments[EB/OL].http://www.cert.org/ advisories/CA-2000-01.html,2000.
  • 10[10]MOORE D,VOELKER G M,SAVAGE S.Interring internet denial-of-service activity[A].Proceedings of the 10th USENIX Security Symposium[C].August 2001.

共引文献30

同被引文献49

引证文献5

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部