期刊文献+

一种基于日志关联的网络攻击追踪系统模型 被引量:1

A Framework of Network Attacker-Tracing System Based on Log Correlation
在线阅读 下载PDF
导出
摘要 在论述日志关联分析平台的体系结构与功能模块的基础上,提出一种新的网络攻击追踪系统模型。阐述该模型的总体结构与工作流程,提出基于登录链的追踪算法。模拟实验结果表明,该模型能够在可控网络内准确地找到攻击者的真实位置以及攻击路径。最后,分析系统可能存在的问题,并提出解决方案。 The article provides the system architecture and the principal functions of the log correlation system,then presents a framework of network attacker-tracing system.It expounds the structure and workflow of tracing system and the algorithm of attacker-tracing based on login chain.The simulation result shows that the framework can find the real location and the login path of the attacker in the controlled network environment.Finally,it analyzes the potential problems of the system and provides the solutions
出处 《重庆科技学院学报(自然科学版)》 CAS 2007年第4期81-84,共4页 Journal of Chongqing University of Science and Technology:Natural Sciences Edition
基金 国家自然科学基金项目资助(70471064) 福建农林大学青年教师科研基金资助项目(06A16)
关键词 关联分析 登录链 攻击追踪 追踪算法 correlation login chain attacker-tracing tracing algorithm
  • 相关文献

参考文献6

  • 1谷大武,李小勇,陆海宁.网络攻击源追踪系统模型[J].上海交通大学学报,2003,37(3):411-415. 被引量:3
  • 2[2]Bellovin S,Leech M,Taylor T.ICMP Traceback Messages[EB/OL].IETF Internet Draft"draft-ietf-itrace-04.Txt,Work in progress,2003.
  • 3[3]Thomas E.Daniels.Reference Models for the Concealment and Observation of Origin Identity in Store-and-forward Networks[EB/OL].http://home.eng.iastate.edu/~daniels/papers/diss.pdf,2002.
  • 4李小勇,刘东喜,谷大武,白英彩.可控网络攻击源追踪技术研究[J].计算机研究与发展,2003,40(6):808-812. 被引量:6
  • 5[5]Kunikazu Yoda,Hiroaki Etoh.Finding a Connection Chain for Tracing Intruders[EB/OL].http://www.research.ibm.com/trl/projects/security/chaintrace/paper/main.html,2000.
  • 6左羽.网络追踪技术研究[J].重庆工学院学报,2006,20(5):111-114. 被引量:3

二级参考文献11

  • 1Dawn X S,Adrian Perrig.Advanced and authenticated markingschemes for IP traceback[A].Proceedings of IEEE NFOCOM '01[C].Anchorage,Alaska:April,2001:878-886.
  • 2Park K,Lee H.On the effectiveness of probabilistic packet marking forIP traceback under denial of service attack[A].roceedings of IEEEINFOCOM'01[C].Anchorage,Alaska:April,2001:338-347.
  • 3Savage S,Wetherall D,Karlin A,et al.NetworkSupport for IP Traceback[J].IEEE ACM Trans on Networking,2001,9(3):226-237.
  • 4Baba T,Matsuda S.Tracing Network Attacks to Their Sources[J].IEEE Internet Computing,2002,6(2):20-26.
  • 5Denning D E. An Intrusion-detection model [J].IEEE Transactions on Software Engineer, 1987, SE-13(2):222-232.
  • 6Mukherjee B, Heberlein T, Levitt K. Network intrusion detection [J]. IEEE Network, 1994, 8 (3):26-41.
  • 7Shieh S P, Gligor V D. On a pattern-oriented model for intrusion detection[J]. IEEE Transactions on Knowledge and Data Engineering, 1997, 9(4): 661 -667.
  • 8李小勇,谷大武,白英彩.DRIDS:一个分布式实时入侵检测系统模型[A].第二届中国信息和通信安全学术会议(CCICS'2001)论文集[C].北京:科学出版社,2001.117-121.
  • 9Schneier B. Applied cryptography, protocols, algorithms, and source code in C[M]. 2nd ed. New York: John Wiley & Sons, Inc, 1996.
  • 10Staniford-Chen S. Distributed tracing of intruders[D]. Berkeley: Univ of California, 1995.

共引文献9

同被引文献11

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部