期刊文献+

基于IPv6改进的AMS-v6与APPM-v6方案研究 被引量:1

Improved AMS-v6 and APPM-v6 scheme based on IPv6
在线阅读 下载PDF
导出
摘要 包标记算法是IPv4下追踪DDOS攻击源最多的一种方法,但IPv6下实施困难。由此对IPv6下包标记方法的可行性进行了研究。为有效和安全的部署和实施数据包标记算法,利用IPv6新的特点,并结合标记流标签等字段,提出两种基于IPv6的改进方案AMS-v6和APPM-v6。在IPv4和IPv6协议下设计模型分别对两种算法进行实验对比,仿真实验结果表明了该算法在IPv6下数据包标记的有效性和适用性,并有效减少重构时间和所需数据包数量,提高重构攻击路径的速度。 The packet marking algorithm is the most popular method for DDOS trackback under IPv4, but it is more difficult in the implementation of IPv6. So the feasibility of packet marking method is studied under IPv6. For the effective and safe deployment and implementation of packet marking algorithm, use of new features and IPv6 flow label field with tag, two IPv6-based improvement program AMS-v6 and APPM-v6 are proposed. Under IPv4 and IPv6 protocols to design the model, and by comparison of two algorithms, simulation results show the packet marking algorithm validity and applicability under IPv6, and effectively reduce the reconstruction time and decrease the number of packet the path reconstruction needs, and increase the speed of path reconstruction,
出处 《计算机工程与设计》 CSCD 北大核心 2012年第1期56-60,共5页 Computer Engineering and Design
基金 国家自然科学基金项目(60573142) 上海市(第三期)重点学科基金项目(S30504)
关键词 IP追踪 拒绝服务攻击 分布式拒绝服务 IPV6协议 概率包标记 IP traceback denial of service (Dos) distributed denial of service (DDoS) IPv6 protocol probabilistic packetmarking (PPM)
  • 相关文献

参考文献15

  • 1Spence J. IPv6 security and security update [C/OL]. NAv6TF/ ARINXVItN6Conference, http: //www. nav6tf, org/documents/ arinnav6tf-apr05/6. IPv6 _ Security_ Update _ JS. pdf, 2005.
  • 2YANG Xinyu, MATing, SHI Yi. Typical DoS/DDoS threats under IPv6 [C]. International Multi-Conference on Computing in the Global Information Technology, 2007: 50-55.
  • 3Savage S, Wetherall D, Karlin A, et al. Practical network support for IP tracebaek [C]. Stockholm, Sweden.. Proceedings of the ACM SIGCOMM Conference, 2000: 295-306.
  • 4Song D, PerrigA. Advanced and authenticated marking schemes for IP traceback [ C]. Proceedings of IEEE INFOCOM, 2001:878-886.
  • 5占勇军,谢冬青,周再红,罗莉莉.IPv6下基于改进的SPIE源追踪方案[J].计算机工程与科学,2007,29(4):11-13. 被引量:5
  • 6Emil Albright, Dang Xuan-Hien. An implementation of IP tra- ceback in IPv6 using probabilistic packet marking [C] Las Ve- gas: Proe of Intl Conf on Internet Computing, 2005: 26-30.
  • 7Liu Jenshiuh. Dynamic probabilistic packet marking for efficient IP traceback [J]. Computer Networks, 2007, 51 (3): 866-882.
  • 8MATing. A link signature based DDoS attacker tracing algo- rithm under IPv6 [J]. International Journal of Security and Its Applications, 2009, 3 (2): 27-36.
  • 9Emil Albright, Dang Xuan-Hien. An implementation of IP tra- eeback in IPv6 using probabilistic packet marking [C]. Las Ve- gas: Proceedings of the International Conference on Internet Computing, 2005: 26-30.
  • 10Andrey Belenky, Nirwan Ansari. Tracing multiple attackers with deterministic packetmarking (DPM) [C]. Seoul, Korea: IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 2005.

二级参考文献26

  • 1曲海鹏,李德全,苏璞睿,冯登国.一种分块包标记的IP追踪方案[J].计算机研究与发展,2005,42(12):2084-2092. 被引量:9
  • 2曲海鹏,冯登国,苏璞睿.基于有序标记的IP包追踪方案[J].电子学报,2006,34(1):173-176. 被引量:6
  • 3Stefan Savage,David Wetherall,Anna Karlin,et al.Practical network support for IP traceback[J].Computer Communication Review,2000,30(4):295-308.
  • 4Dawn Xiaodong Song, Adrian Perrig. Advanced and authenticated marking schemes for IP traceback[C].Alaska:Proc of the IEEE INFOCOM,2001:878-886.
  • 5Liu Jenshiuh,Lee Zhi-Jian,Chung Yeh-Ching.Dynamic probabilistic packet marking for efficient IP traceback[J].Computer Networks,2007,50(3):866-882.
  • 6Durresi A,Paruchuri V, Barolli L,et al.Efficient and secure autonomous system based traceback [J]. Journal of Interconnection Networks,2004,5(2): 151-164.
  • 7Dean D,Franklin M,Stubbletield A.An algebraic approach to IP traceback[C].Network and Distributed System Security Symposium Conference Proceedings,Diego Supercomputer Center,2001:1-10.
  • 8Park K,Lee H.On the effectiveness of probabilistic packet marking for IP traekbaek under denial of service attack[C].Alaska: Proc of the IEEE INFOCOM,2001:338-347.
  • 9Savage S,Wetherall D,Karlin A,et al.Practical Network Support for IP Traceback[C] Proceedings of the 2000 ACM SIGCOMM Conference,Stockholm,Sweden,2000-08:295-306.
  • 10Song D X,Perrig A.Advanced and Authenticated Marking Schemes for IP Traceback[C].Proceedings of IEEE INFOCOM'01,Anchorage,Alaska,2001-04:878-886.

共引文献12

同被引文献14

  • 1陆音,石进,黄皓,谢立.综述:关于IPv6安全性问题的研究[J].计算机科学,2006,33(5):5-11. 被引量:15
  • 2占勇军,谢冬青,周再红,罗莉莉.IPv6下基于改进的SPIE源追踪方案[J].计算机工程与科学,2007,29(4):11-13. 被引量:5
  • 3Ston R.An IP overlay network for tracking Do S floods[C]//Proc of USENIX Security Symposium,2000.
  • 4Lee T H,Wu Weikai,Yau T.Scalable packet digesting schemes for IP traceback[C]//Proc of IEEE International Conference on Communications,2004:1006-1014.
  • 5Sung M,Xu J.IP traceback-based intelligent packet filtering a novel technique for defending against Internet DDo S attacks[J].IEEE Trans on Parallel and Distributed Systems,2003,14(9):860-872.
  • 6Mank N A,Massey D,Wu C.ICMP traceback[C]//IEEE International Conference on Communications and Networks,2001:158-165.
  • 7Savage S,Wetherall D.Practical network support for IP traceback[C]//Proc of ACM SIGCOMM Conference,2000:295-300.
  • 8Song D,Perrng A.Advanced and authenticated marking schemes for IP traceback[C]//Proc of IEEE Infocomm Conference,2001:877-886.
  • 9冯波,刘海,郭帆,余敏.一种改进型PPM方法的设计与仿真实现[J].计算机工程,2011,37(12):133-136. 被引量:1
  • 10闫巧,宁土文.基于确定线性网络编码的IPv6追踪[J].计算机应用,2011,31(9):2352-2355. 被引量:1

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部