期刊文献+

基于反向节点标记的攻击源追踪方法 被引量:1

IP traceback scheme based on reverse node sampling
在线阅读 下载PDF
导出
摘要 在防范拒绝服务攻击的问题上,随机包标记方法是比较好的策略。已有方法之一是Savage提出的NodeSampling算法。ReverseNodeSampling在对NodeSampling算法性能进行理论分析的基础上,针对其缺陷做出一定程度上的改进。对改进后的算法在理论上进行性能分析,并在实验中验证。通过实验结果的比较,验证了改进后的算法在性能上大大优于原有的NodeSampling算法。 Probabilistic packet marking (PPM) is an efficient solution to defeat denial-of-service attacks. One of the available solutions is node sampling scheme proposed by Savage. Based on the theoretic analysis of node sampling scheme, some improvement are provided. Conducting performance analyzing is proven by simulation on the improved scheme by comparing the simulation results, the improved scheme is much better than the original node sampling scheme at performance is obtained.
出处 《计算机工程与设计》 CSCD 北大核心 2006年第18期3314-3317,共4页 Computer Engineering and Design
基金 国家自然科学基金项目(60373021)。
关键词 拒绝服务攻击 攻击源追踪 随机包标记 节点采样 反向节点采样 denial-of-service IP traceback probabilistic packet marking node sampling reverse node sampling
  • 相关文献

参考文献10

  • 1John Howard.An analysis of security incidents on the intemet[D].Carnegie Mellon University,1998.
  • 2Savage S,Wetherall D,Karlin A,et al.Practical network support for IP traceback[J].ACM SIGCOMM Computer Communication Review,2000,30(4):295-306.
  • 3夏春和,王海泉,吴震,王继伟.攻击源定位问题的研究[J].计算机研究与发展,2003,40(7):1021-1027. 被引量:16
  • 4Burch H,Cheswick B.Internet watch:Mapping the internet[J].Computer,1999,32(4):97-98.
  • 5Bill Cheswick,Hal Burch.The internet mapping project[EB/OL].2002.http://research.lumeta.com/ches/map/.
  • 6Caida.Skitter[EB/OL].http://www.caida.org/tools/measurement/skitter/.
  • 7Abraham Yaar,Adrian Perrig,Dawn Song.Pi:A path identification mechanism to defend against DDoS attacks[C].Proceedings of the 2003 IEEE Symposium on Security and Privacy,IEEE Computer Society,2003.93-107.
  • 8Network Simulator 2[EB/OL].http://www.isi.edu/nsnam/ns.
  • 9杨余旺,杨静宇,孙亚民.分布式拒绝服务攻击的实现机理及其防御研究[J].计算机工程与设计,2004,25(5):657-660. 被引量:15
  • 10刘键强,王韬,向阳霞,王昌盛.基于生存性的应对拒绝服务攻击的策略[J].计算机工程与设计,2004,25(4):593-595. 被引量:2

二级参考文献30

  • 1周明天 汪文勇.TCP/IP网络原理与技术[M].北京:清华大学出版社,1999..
  • 2Tripwire. Tripwire for servers [R/OL]. http:∥www. tripwire.com/products/servers/.
  • 3David Moore, Ram Periakaruppan, Jim Dono-hoe, et al.Where in the world is net-geo.caida.org? [C]. INET 2000Proceedings, 2000.
  • 4CERT Coordination Center. Trends in denial of service attacktechnology[R/OL]. 2001.
  • 5Jelena Mirkovic, Janice Martin, Peter Reiher. A taxonomy of DDoS attacks and DDoS defense mechanisms[R]. Computer Science Department University of California, Los Angeles Technical Report #020018,2001.
  • 6王国伟. 网络安全分布式 DDOS 攻击 [N/OL]. http:∥it.rising.com.cn/.
  • 7Howard J D, Longstaff T A. A common language for computer security incidents [R/OL]. Sandia Report: SAND 98-8667, Sandia National Laboratories, http:∥www. cert.org/research/taxonomy_988667.pdf.
  • 8Axelsson S. Intrusion detection systems: A survey and taxonomy [R/OL]. Technical Report 99-15, Department of Computer Engineering, Chalmers University, 2000.
  • 9Debar H, Dacier M, Wespi A. Towards a taxonomy of intrusion-detection systems[J]. Computer Networks, 1999,31(8):805-822.
  • 10Hafner K, Markoff J. Cyberpunk: Outlaws and hackers on the computer frontier[M]. Simon & Schuster, 1991.21-140.

共引文献30

同被引文献22

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部