期刊文献+

攻击源定位问题的研究

Research of Tracing Attack
在线阅读 下载PDF
导出
摘要 绝大多数网络攻击都使用伪造的IP地址,使被攻击者很难确定攻击源的位置,从而不能有针对性地实施保护策略。能否找到一种类似于Traceroute方法的逆过程,能追踪报文的传输路径,是网络安全领域的一大难点。对攻击源定位问题进行了深入的研究、分析,对每一种方法进行了算法抽象,并用流程图描述,其中重点阐述了针对拒绝服务攻击的定位方法———采样标记法。最后通过研究、比较当前所有的定位方法,归纳出攻击源定位问题的本质及其数学模型。 Most of the network attacks use spoofing IP address,which makes it very difficult to tracing attack to its real origin.Several tracing attack methods are discussed,analyzed and abstracted,especially those methods of solving denial of service attacks.The core algorithms of each methods are described in flowchart.Finally,these methods are compared,then a mathematical model is educed,it reveals the essence of the tracing attack problem.
出处 《计算机应用研究》 CSCD 北大核心 2003年第8期20-24,共5页 Application Research of Computers
基金 航空科学基金资助项目(01F51054) 总装备部"十五"预研资助项目(418010703)
关键词 网络安全 攻击源定位 Network Security Tracing Attack
  • 相关文献

参考文献7

  • 1周明天 汪文勇.TCP/IP网络原理与技术[M].北京:清华大学出版社,1999..
  • 2S M Bellovin. ICMP Traceback Message[Z]. Internet Draft:draft-bellovin-itrace-O0, txt, Mar. 2000.
  • 3V Paxsion. End-to-End Routing Behavior in the Internet [ Z].IEEE/ACM Transactions on Networking, Oct .2000.
  • 4Cisco Systems. Configuring Tcp Intercept(Prevent Denial-of-Service Attack) [ Z]. Cisco IOS Documentation, Dec. 1997.
  • 5Computer Emergency Response Team. Advisory CA-2000-21Denial-of-Service Vulnerabilities in TCP/IP Stacks [EB/OL].http ://www. cert. org/advisories/CA-2000-21, html, 2000-12.
  • 6Computer Emergency Response Team. Advisory CA-2000-01Denial-of-Service Developments [ EB/OL]. http://www, cert.org/advisories/CA-2000-01, html, 2000-01.
  • 7I Stoica, H Zhang. Providing Guaranteed Services Without Per Flow Management [ C ]. In Proceedings of the 1999 ACMSIGCOMM Conference, 1999.81-94.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部