期刊文献+

基于重叠概率包标记的IP追踪策略

IP Traceback Based on Overlapping PPM
下载PDF
导出
摘要 如何防御分布式拒绝服务攻击是当今最重要的网络安全问题之一。许多研究人员提出了防御方案,其中由Savage等人提出的概率包标记策略受到了广泛的重视。文章在此基础上,提出了一种重叠概率包标记策略,与基本包标记策略相比,该策略只需4个有效碎片就能重构出一条边界,并且在碎片重组时,减少了验证IP有效性的次数,提高了路径重构的效率。 Defending against distributed denial-of-service attacks is one of the important security problems on the Internet.Several countermeasures are proposed,among which,Probabilistic Packet Marking (PPM) first developed by Savage et al is promising.Based on PPM,we propose Overlapping PPM scheme.Compared with PPM,the scheme needs only four efficient fragments to build one edge,and it can decrease the time of validating the IP,and can increase the efficiency of path reconstruction.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第16期153-155,206,共4页 Computer Engineering and Applications
基金 湖南大学科学基金资助项目(编号:521101626)
关键词 IP追踪 分布式拒绝服务 重叠概率包标记 IP traceback,distributed denial of service, Overlapping Probabilistic Packet Marking
  • 相关文献

参考文献2

二级参考文献26

  • 1Banga G,Dnlsched P,Mogul J.Resource containers:A new facility for resource management in server system.J In:OSDI ed.Proceedings of the 1999 USENIX/ACM Symposium on Operating System Design and Implementation(OSDI'99).New Orleans,LA:OSDI,1999.45-58. 被引量:1
  • 2Spatscheck O.Peterson L.Defending against denial of service attacks in scout In:OSDI,ed.Proceedings of the 1999 USENIX/ACM Symposium on Operationg System Design and Implementation(OSDI'99)New orleans,LA:OSDI,1999,59-72 被引量:1
  • 3Meadows c.A formal framework and evaluation method for network denial of service In:PCSFW,ed.Proceeding.Of the 1999 IEEE Computer Security Foundations Workshop.Mordano IEEE Compmer Society Press,1999.4-13. 被引量:1
  • 4Savage S,Wetherall D,Karlin A,Anderson T.Practical network support for lP traceback.1n:ACM,ed.Proceedings of the ACM SIGCOMM 2000.Sweden:ACM,2000.295-300. 被引量:1
  • 5Song D,Perrig A.Advanced and authenticated techniques for IP traceback In:INFOCOM,ed.Proceedings of the IEEE INFOCOM 2001.Anchorage:INFOCOM,2001 被引量:1
  • 6Mayeda W.Graph Theory.NewYork:Wiley-Interscience,1972. 被引量:1
  • 7Klamkin M,Newmall D.Extensions of the birthday surprise Journal of Combinatorial Theory,1967.279~282. 被引量:1
  • 8CERT.CERT Statistics.http://www.cert.org/stats/#incidents 被引量:2
  • 9Park K,Lee H.A proactive approach to distributed DoS attack prevention using route-based packet filtering.Technical Report,CSD00-017,Department of Computer Sciences,Purdue University,2000.http://www.cs.purdue.edu/nsl/dpf-tech.ps.gz 被引量:2
  • 10Savage S,Wetherall D,Karlin A,Anderson T.Practical network support for IP traceback.In:Proc.of the 2000 ACM SIGCOMM Conf.Stockholm,2000.295-306.http://www.acm.org/sigs/sigcomm/sigcomm2000/conf/paper/sigcomm2000-8-4.ps.gz 被引量:2

共引文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部