期刊文献+

一种基于路由器的伪装IP回溯方法

A Router-Based Method of IP Traceback
下载PDF
导出
摘要 在因特网中,攻击者能伪造其IP地址。本文提出了一种新的针对洪泛型攻击(flooding attack)的IP回溯技术——PPL。在该方法中,路由器以一定的概率存储转发分组的信息,然后利用这些信息,从被攻击者开始回溯攻击分组到其源,对网络攻击者起到威慑的作用,仿真实验证明,新方案在回溯洪泛型攻击时,其性能优于文[2]中的方案。 This paper descriebes a technique for tracing anonymous packet flooding attacks in the Internet back toward their source. In our approach. forwarding nodes (such as routers) log information with probabilistic about traversing packets on the Internet and then use the log data to trace each packet from, its final destination back to its source,hop by hop- The simulation test proves that the performance of PPL is better than method in literature \_2~\-
出处 《计算机科学》 CSCD 北大核心 2004年第4期67-68,112,共3页 Computer Science
关键词 因特网 路由器 洪泛型攻击 防火墙 伪装IP回溯方法 计算机网络 网络安全 Distributed manegement, Network security, IP traceback.Probabilistc packet logging, Denial-of-service
  • 相关文献

参考文献6

  • 1Savage S,et al. Practical Network Support for IP Traceback. In:Proc. 2000 ACM SIGCOMM, ACM Press, New York, Aug.2000. 295-306. Aavailable online at: http:// www. cs.washington_edu/homes/savage/traceback. html.
  • 2Baba T,Matsuda S. Tracing Network Attacks to Their Sources.IEEE Internet Computing,2002.20-26
  • 3Song D X, Perrig A. Advanced and Authenticated Marking Schemes for IP Traceback. IEEE INFOCOM 2001
  • 4Bellovin S M. Security Problems in the TCP/IP Protocol Suite.Computer Communications Review, 1989,9 (2): 32 - 48
  • 5Microsoft Corporation. Stop 0A in tcpip. sys when receiving out of band (OOB) data. Available Online at: http : //support.microsoft. com/sup-port/kb/articles/Q143/4/78. asp
  • 6Snoeren A C, et al. Single-Packet IP Traceback. IEEE/ACM Transactions on Networking, 2002,10(6): 721 - 734

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部