期刊文献+

基于路由器接口的IP追踪方案 被引量:1

IP traceback based on router interface
在线阅读 下载PDF
导出
摘要 IP追踪是防御分布式拒绝服务攻击的重要方法。分析了Gong等人的IP追踪方法,指出了存在重构路径速度慢的缺点,并针对这一缺点,提出了一个改进方案。新方案使用路由器的接口信息来标志一个路由器,缩短了原方法中的标记长度,并灵活地根据路由器部署情况来选择是否做日志记录操作,从而提高了重构的速度,降低了误报率,并能更好地适应渐进式的部署。 IP traceback is an important way to defend against distributed denial of service attack. Gong et al's IP tracebaek method was analyzed and the disadvantage of low speed in reconstructing path was pointed out. An improved scheme was proposed to overcome the disadvantage. The presented scheme employed the information of router interface to mark a route so as to shorten the mark length in original method. In the proposed scheme, the speed of reconstructing path was enhanced and the false positive was lowered since it was decided whether the log was detected according to the deployment of router. Moreover, the scheme can well support incremental deployment.
出处 《计算机应用》 CSCD 北大核心 2011年第3期774-777,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(61070164 60773083) 广东省自然科学基金资助项目(8151063201000022) 广东省科技计划项目(2010B010600025)
关键词 日志记录 路由器 重构路径 IP追踪 部署 log router path reconstruction IP traceback deployment
  • 相关文献

参考文献10

  • 1SAVAGE S, WETHERALL D, KARLIN A, et al. Practical network support for IP traceback [ C]//Proceedings of the ACM SIGCOMM 2000 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. New York: ACM Press, 2000:295-306.
  • 2曲海鹏,冯登国,苏璞睿.基于有序标记的IP包追踪方案[J].电子学报,2006,34(1):173-176. 被引量:6
  • 3徐劲松.一种改进的路由包标记追踪方案[J].计算机应用,2009,29(5):1316-1320. 被引量:5
  • 4徐劲松,黄汝成,王元捷.一种改进的数据包标记追踪方案——CDPM[J].计算机应用,2009,29(12):3185-3187. 被引量:2
  • 5XIANG Y, ZHOU W L, GUO M Y. Flexible deterministic packet marking: An IP traceback system to find the real source of attacks [ J]. IEEE Transactions on Parallel and Distributed System, 2009, 20(5) : 567 -580.
  • 6CHANG H Y, NARAYAN R, WU S F, et al. DECIDUOUS: De- centralized source identification for network-based intrusions [ C]// Proceedings of the Sixth IFIP/IEEE International Symposium on In- tegrated Network Management. Boston, USA: [s. n. ], 1999:701 -714.
  • 7SNOEREN A C, PARTRIDGE C, SANCHEZ L A, et al. Hash- based IP traceback [ C] // Proceedings of the ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Pro- tocols for Computer Communication. New York: ACM Press, 2001: 3 -14.
  • 8GONG C, SARAC K. A more practical approach for single-packet IP traceback using packet logging and marking [ J]. IEEE Transac- tions on Parallel and Distributed System, 2008, 19(10) : 1310 - 1324.
  • 9CHEN R L, PARK J M, MARCHANY R, et al. RIM: Router in- terface marking for IP traceback [ C]// Global Telecommunications Conference. San Francisco, USA: [s.n.], 2006:1-5.
  • 10MUTHUPRASANNA M, MANIMARAN G, MANZOR M, et al. Coloring the Intemet: IP traceback [ C]// Proceedings of the 12th International Conference on Parallel and Distributed Systems. Min- nesota, USA: [ s. n. ], 2006:589 -598.

二级参考文献28

  • 1SAVAGE S, WETHERALL D, KARLIN A, et al. Practical network support for IP traceback [ C]// Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. New York: ACM Press, 2000:295-306.
  • 2SONG D, PERRIG A. Advanced and authenticated marking schemes for IP traceback [ C]//Proceedings of Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies: INFO- COMM 2001. Washington, DC: IEEE Computer and Communications Soeieties, 2001, 2:878-$86.
  • 3DEAN D, FRANKLIN M, STUBBLEFIELD A. An algebraic approach to IP traceback[ J]. ACM Transactions on Information and System Security (TISSEC), 2002, 5(2): 119- 137.
  • 4YEAR A, PERRIG A, SONG D. FIT: fast Intemet traceback[ C]// Proceedings of 24th Annual Joint Conference of the IEEE Computer and Communications Societies: INFOCOMM 2005. Washington, DC: IEEE Computer and Communications Societies, 2005:1395 - 1406.
  • 5LIU J, LEE Z-J, CHUNG Y-C. Dynamic probabilistic packet marking for efficient IP traceback[ J]. Computer Networks: The International Journal of Computer and Telecommunications Networking, 2007, 51(3) : 866 -882.
  • 6SAVAGE S, WETHERALL D, KARLIN A, et al. Practical network support for IP traceback [ C ]// Proceedings of 2000 ACM SIGCOMM Conference. New York: ACM Press, 2000:295 -306.
  • 7WALDVOGEL M. GOSSIB vs. IP traceback rumors [ C]// Proceedings of 18th Annual Computer Security Applications Conference. Washington, DC: IEEE, 2002:5-13.
  • 8BELENKY A, ANSARI N. IP traceback with deterministic packet marking [J]. IEEE Communications Letters, 2003, 7(4) : 162 - 164.
  • 9BELENKY A, ANSARI N. Tracing multiple attackers with Deterministic Packet Marking (DPM) [ C]// PACRIM 2003: IEEE Pacific Rim Conference on Communications, Computers and signal Processing. Washington, DC: IEEE, 2003:49-52.
  • 10QU z, HUANG C. A novel deterministic packet marking scheme for IP traceback [ C]// IEEE PEITS '08. Washington, DC: IEEE Computer Society, 2008:38-41.

共引文献9

同被引文献14

  • 1李德全,徐一丁,苏璞睿,冯登国.IP追踪中的自适应包标记[J].电子学报,2004,32(8):1334-1337. 被引量:33
  • 2揭摄,孙乐昌.一种新的非重复性包标记IP追踪方案[J].计算机工程,2007,33(10):105-107. 被引量:5
  • 3李德全,苏璞睿,魏东梅,冯登国.基于路由器编码的自适应包标记(英文)[J].软件学报,2007,18(10):2652-2661. 被引量:6
  • 4EHRENKRANZ T, LI J. On the state of IP spoofing defense [ J]. ACM Transactions on Intemet Technology, 2009, 9(2): 1 -29.
  • 5SAVAGE S, WETHERALL D, KARLIN A, et al. Practical network support for IP traceback [ C] // Proceedings of the ACM SIG- COMM 2000 Conference on Applictions, Technologies, Architec- tures, and Protocols for Computer Communication. New Youk: ACM. 2000:295 - 306.
  • 6XI ANGY, ZHOU W L, GUO M Y. Flexible deterministic packet marking: An IP traceback system to find the real source of attacks [ J]. IEEE Transactions on Parallel and Distributed System, 2009, 20(5) : 567 -580.
  • 7MUTHUPRASANNA M, MANIMARAN G, MANZOR M, et al. Colo- ring the lnternet: 1P traceback [ C] //Proceedings of the 12th Inter- national Conference on Parallel and Distributed Systems. Washing- ton, DC: IEEE Computer Society, 2006:589 -598.
  • 8GONG C, SARAC K. A more practical approach for single-packet IP traceback using packet logging and marking [ J]. IEEE Transactions on Parallel and Distributed System, 2008, 19( 10): 1310 -1324.
  • 9LIU J, LEE Z-J, CHUNG Y-C. Dynamic probabilistic packet mark- ing for efficient IP traceback [ J]. The International Journal of Com- puter and Telecommunications Networking, 2007, 51 (3) : 866 - 882.
  • 10CHEN R L, PARK J M, MARCHANY R, et al. RIM: Router inter- face marking for IP traceback [ C] // Global Telecommunications Conference. San Francisco, USA: IEEE, 2006:1 - 5.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部