期刊文献+

攻击源定位问题的研究 被引量:16

Research on Tracing Attacks
在线阅读 下载PDF
导出
摘要 绝大多数网络攻击都使用伪造的IP地址 ,使被攻击者很难确定攻击源的位置 ,从而不能有针对性的实施保护策略 能否找到一种类似于traceroute方法的逆过程 ,能追踪报文的传输路径 ,是网络安全领域的一大难点 对攻击源定位问题进行了深入的研究、分析 ,对每一种方法进行了算法抽象 ,并用流程图描述 ,其中重点阐述了针对拒绝服务攻击的定位方法———采样标记法 最后对当前定位方法进行了比较和归纳 。 Most of the network attacks use spoofing IP address, which makes it very difficult to trace an attack to its real origin Several tracing attack methods are discussed, analyzed and abstracted with emphasis on those methods of solving denial of service attacks The core algorithms of the methods are described in flowchart Finally, these methods are compared with each other
出处 《计算机研究与发展》 EI CSCD 北大核心 2003年第7期1021-1027,共7页 Journal of Computer Research and Development
基金 航空科学基金项目 ( 0 1F5 10 5 4) 总装备部"十五"预研基金项目 ( 4 180 10 70 3 )
关键词 网络安全 攻击源定位 traceroute方法 逆过程 network security tracing attack
  • 相关文献

参考文献12

  • 1周明天 汪文勇.TCP/IP网络原理与技术[M].北京:清华大学出版社,1999..
  • 2Ratul Mahajan, Steven M Bellovin, Sally Floyd et al. Controlling high bandwidth aggregates in the network. 2001. http://www. acm. org/sigcomm/ccr/archive/2002/julo2/ccr-2002-3-mahajan, pdf.
  • 3R Stone. CenterTraek. An IP overlay network for tracking DoS floods. The 9th USENLX Security Symposium, Denver,Colorado, 2000.
  • 4I Stoica, H Zhang. Providing guaranteed services without per flow management. In: Proc of the 1999 ACM SIGCOMM Conf, 1999.81-- 94. http//www.acm.org/sigcomm/sigcomm99/papers/sessions3-1.pdf.
  • 5P Ferguson, D senie. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. RFC 2267, 1998. http://www.rfc.net/rfc 2267.html.
  • 6Cisco Systems. Configuring TCP intercept (Prevent Denial-of-Service Attacks). Cisco IOS Documentation, 1997.
  • 7Computer Emergency Response Team. Advisory CA-2000-21 denial-of-service developments.2000. http://www. cert. org/advisories/CA-2000-21, html.
  • 8Computer Emergency Response Team. Advisory CA-2000-01 denial-of-service developments. 2000. http://www.cert.org/advisories/CA-2000-01, html.
  • 9S Bellovin, M Leech, T Taylor. ICMP traceback messages. 2001.http://search, ieff. org/internet- drafts/draft -ietf- itrace-01, txt.
  • 10D X Song, A Perrig. Advanced and authenticated marking schemes for IP traceback. IEEE Infocom, 2001. http://www. ieee-infocom, org/2001/paper/476, p5.

共引文献14

同被引文献211

引证文献16

二级引证文献99

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部