期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Topology-assisted deterministic packet marking for IP traceback 被引量:3
1
作者 WANG Xiao-jing WANG Xiao-yin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2010年第2期116-121,共6页
A novel deterministic packet marking (DPM) for IP traceback against denial of service (DOS) and distributed denial of service (DDoS) attacks is presented, which features good scalability and high accuracy. In th... A novel deterministic packet marking (DPM) for IP traceback against denial of service (DOS) and distributed denial of service (DDoS) attacks is presented, which features good scalability and high accuracy. In this scheme, an ingress router pre-calculates a Hash of its IP address and splits the Hash into several fragments. When marking a packet, the router randomly selects a fragment to mark into the packet. In the traceback stage the victim identifies the marked router with the help of the map of its upstream routers. Based on the map, the victim can identify a candidate ingress router after receiving only several marked packets. The scheme overcomes defects in previous deterministic packet marking schemes, where too much packets are required to recover a router and high false positive rate occurs in case of large-scale DDoS. Theoretical analysis, the pseudo code and experimental results are provided. The scheme is proved to be accurate and efficient and can handle large-scale DDoS attacks. 展开更多
关键词 network security DDOS 1P traceback deterministic packet marking (DPM)
原文传递
Packet track and traceback mechanism against denial of service attacks 被引量:2
2
作者 LI Li SHEN Su-bin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2008年第3期51-58,共8页
The denial of service attack is a main type of threat on the Internet today. On the basis of path identification (Pi) and Internet control message protocol (ICMP) traceback (iTrace) methods, a packet track and t... The denial of service attack is a main type of threat on the Internet today. On the basis of path identification (Pi) and Internet control message protocol (ICMP) traceback (iTrace) methods, a packet track and traceback mechanism is proposed, which features rapid response and high accuracy. In this scheme, routers apply packet marking scheme and send traceback messages, which enables the victim to design the path tree in peace time. During attack times the victim can trace attackers back within the path tree and perform rapid packet filtering using the marking in each packet. Traceback messages overcome Pi's limitation, wherein too much path information is lost in path identifiers; whereas path identifiers can be used to expedite the design of the path-tree, which reduces the high overhead in iTrace. Therefore, our scheme not only synthesizes the advantages but also compromises the disadvantages of the above two methods. Simulation results with NS-2 show the validity of our scheme. 展开更多
关键词 denial of service (DoS) attack TRACEBACK packet marking Pi
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部