期刊文献+

一种用于实时追踪DDoS攻击源的分步算法 被引量:1

DDoS Traceback Scheme Based on Real-Time Consideration
在线阅读 下载PDF
导出
摘要 鉴于因特网出现了越来越多的DDoS攻击事件,而且这些攻击事件大多数都是利用“地址欺骗(IPSpoofing)”的攻击手段,因此DDoS攻击源追踪问题已成为网络安全研究领域的一个新方向.本文提出了一种分步追踪攻击源的新算法,其核心思想是首先由基于自治域系统(AS)的概率标记算法(ASPPM)将攻击源确定在某些AS中,然后在AS自治域范围内再使用随机数标记算法(RNPM)精确定位攻击源位置.与其它DDoS攻击源追踪算法比较,该分步算法具有收敛速度快、路径计算负荷小以及较低的误报率等特点,非常适合实现对DDoS攻击的实时追踪. DDoS attack has increasingly become a great threat to the current Internet, Due to the fact that IP spoofing technique is frequently used,defending DDoS attack faces extreme difficulty. Most of the previous approaches to this problem try to solve it on a generalized Internet scale. For many reasons,the related tracing process requires great overhead and the solutions are difficult to implement, This paper proposes a new DI)oS traceback scheme based on real-time consideration by dividing the tracing process into two steps, In the first step ,ASPPM Scheme is adopted to determine the attack-originating AS. The second step processing concentrates on identifing ins the exact origin of the attacks. Compared the to the previous schemes,the two-step traceback scheme has the benefits of quick convergence speed,light computational overhead and low false positive. So it is possible to trace the DDoS source on a real-time basis.
出处 《小型微型计算机系统》 CSCD 北大核心 2006年第6期1072-1076,共5页 Journal of Chinese Computer Systems
关键词 网络安全 DDOS攻击 IP追踪 数据包标记. Network Security DDoS Attack IP Traceback Packet Marking
  • 相关文献

参考文献11

  • 1Stephen Specht and Ruby Lee. Taxonomies of distributed denial of service networks,attacks, tools and countermeasures[R].Princeton University Technical Report CE-L2003-03.
  • 2Stefan Savage, David Wetherall, Anna R. Karlin,etal. Practical network support for IP traceback[C]. SIGCOMM, 2000.
  • 3Steve Bellovin, Marcus Leech, Tom Taylor. ICMP traceback messages [R]. Tech. Rep, February 2003, http://www.ietf.org/internet-drafts/draft-ietf-itrace-04. txt.
  • 4Matt Franklin,Drew Dean and Adam Stubblefield. An algebraic approach to IP traceback[C]. In:Network and Distributed System Security Symposium(NDSS' 01),February ,2001.
  • 5Dawn X. Song and Adrian Perrig. Advanced and authenticated marking schemes for IP traceback[C]. In: Proc.IEEE IN-FO-COM, 2001,4 : 878-886.
  • 6Snoren A C, Partridge C,Sanchez L A,etal. Hash-based IP traceback[C].In : Proc. ACMSIGCOMM, 2001,8:3-14 .
  • 7John Ioannidis and Steven M. Bellovin. Implementing pushback:Router-based defense against DDoS attacks [C]. In: Proc. Network and Distributed System Security Symposium(NDSS' 02),February, 2002.
  • 8Magoni D, Pansiot J. Analysis of the autonomous system network topology[J]. ACM Computer Communication Review, v.31 n. 3 July 2001, 26-37.
  • 9Fayed M, Krapivsky P,Byers J,etal. On the size distribution of autonomous systems[R]. Technical Report, Boston University,Jan'2003.
  • 10Howard F. Lipson. Tracking and Tracing Cyber-Attacks Tracking:Technical Challenges and Global PolicyIssues [Z]. CERT(r) Coordination Center, November 2002.

同被引文献5

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部