期刊文献+

使用带认证的入口包标记追踪IP源地址 被引量:1

Authenticated Ingress Packet Marking Schemes for IP Traceback
下载PDF
导出
摘要 本文首先介绍了几种国际上最新的网络攻击IP源地址追踪方案,随后提出了一种带认证机制的、对入口包进行标记的IP地址追踪方案,最后对几种方案进行了比较,说明入口包标记方案具有较好的特性。 This paper first introduces several existing new schemes for combating anonymous attacks and then puts forward an authenticated ingress packet marking scheme for IP traceback (IPM) . Finally, a comparison between the six schemes has been made and this new IPM has many good characteristics.
作者 董玲 陈一民
出处 《计算机工程与科学》 CSCD 2004年第4期11-14,共4页 Computer Engineering & Science
关键词 网络安全 入侵检测系统 网络攻击 认证机制 IP源地址 入口包标记 计算机网络 DoS IP traceback ingress packet marking network security network management
  • 相关文献

参考文献7

  • 1[1]Stefan Savage,David Wetherall,Anna Karlin,et al. Network Supportfor IP Traceback[J].IEEE/ACM Trans on Networking, 2001, 9(3):226-237.
  • 2[2]P Ferguson, D Senie. Network Ingress Filtering: Defeating Denial-of-Service Attacks Which Employ IP Source Address Spoofing[S]. RFC 2827, 2000.
  • 3[3]Tatsuya Baba, Shigeyuki Matsuda. Tracing Network Attacks to Their Sources [J]. IEEE Internet Computing, 2002,6(2):20-26.
  • 4[4]K Ohta,G Mansfield,Y Takei,et al. Detection,Defense, and Tracking of Internet-Wide Illegal Access in a Distributed Manner[A]. Proc INET 2000[C]. 2000.
  • 5[5]F Baker. Requirements for IP Version 4 Routers[S]. RFC 1812,1995.
  • 6[6]R Braden. Requirements for Internet Hosts-Communication Layers[S]. RFC1122, 1989.
  • 7[7]J Postel. Internet Control Message Protocol[S]. RFC 792, 1981.

同被引文献7

  • 1Stefan Savage,David Wetherall,Anna Karlin,et al.Practical network support for IP traceback[J].IEEE/ACM Transaction on Networking,2001,9(3):226-237.
  • 2Kihong Park,Heejo Lee.On the effectiveness of route-based packet filtering for distributed DOS attack prevention in power-law internets[J].Computer Communication Review,2001,31 (4):15-26.
  • 3Drew Dean,Adam Stubblefield.An algebraic approach to IP traceback[J].ACM Transactions on Information and System Security,2002,5(2):119-137.
  • 4Lance Spitzner.The Honeynet project:Trapping the Hackers[J].IEEE Security and Privacy,2003,1 (2):15-23.
  • 5Alex C Snoeren,Craig Partridge.Hash-based IP traceback[J].Computer Communication Review,2001,31 (4):3-14.
  • 6刘宝旭,许榕生.主动型安全防护措施-陷阱网络的研究与设计[J].计算机工程,2002,28(12):9-11. 被引量:24
  • 7陆庆,周世杰.基于边采样包标记的IP源回溯系统[J].计算机应用,2003,23(3):21-23. 被引量:1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部