期刊文献+

HIP基本交换机制的研究与应用 被引量:1

Research on HIP Base Exchange Mechanism and Application
下载PDF
导出
摘要 针对基本交换的安全性和时间开销的正反两个方面,论述了密题计算机制,利用不同的组网方式测量了基本交换的时间开销,通过计算样本均值和标准差分析了其性能的优劣,提出了HIP BE Anti-Spam模型体系结构。该结构根据HIP基本交换的特点及其内建的密题机制,结合出站和入站的双重过滤来防范和阻止垃圾邮件;利用HIP基本交换机制增大垃圾邮件发送源头的代价和成本,防御对邮件服务的DoS攻击,明确了进一步优化HIP BE Anti-Spam模型及算化的研究方向。 The mechanism of base exchange is core and critical application of Host Identity Protocol (HIP) implementation. This paper analyzes security and time overhead of base exchange in pro and corn, presents puzzle computing mechanism. Time overhead of base exchange is measured by different network environment, and mean and standard deviation are computed in order to analyze its performance. The paper proposes HIP Base Exchange (BE) Anti-Spam model architecture In this architecture, spam is prevented through dual filtering of inbound and outbound, and therefore the cost and the computing resource for sending spam are increased, but email service is protected from Denial of Service (DoS) attack.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2007年第S3期1469-1472,共4页 Journal of University of Electronic Science and Technology of China
基金 贵州省自然科学基金(20033007)
关键词 基本交换 HIP BE Anti-Spam模型 主机标识 密题机制 安全关联 base exchange HIP BE Anti-Spam model host identity puzzle mechanism security association
  • 相关文献

参考文献10

  • 1BALAKRISHNAN H,,LAKSHMINARAYANAN K,RATNASAMY S,et al.A layered naming architecture for the Internet[].SIGCOMM’:Proceedings of theConference on ApplicationsTechnologiesArchitecturesand Protocols for Computer Communications.2004 被引量:1
  • 2ROOST L J,TOFT P N,HARALDSSON G.The host identity protocol:an experimental evaluation. http://kom.aau.dk/group/05gr680/Communication Networks2005 . 2007 被引量:1
  • 3MOSKOWITZ R,NIKANDER P.Host identity protocol(HIP)architecture[].ftp://ftprfc-editororg/in-notes/pdfrfc/RFC.2007 被引量:1
  • 4NIKANDER P.Applying host identity protocol to the Internet addressing architecture[].SAINT’:Proceedings of theInternational Symposium on Applications and the Internet.2004 被引量:1
  • 5AL-SHRAIDEH F.Host identity protocol[].ICNICONSMCL’:Proceedings of the International Conference on NetworkingInternational Conference on Systems and International Conference on Mobile Communications and Learning Technologies.2006 被引量:1
  • 6MOSKOWITZ R,NIKANDER P,JOKELA P,et al.Host identity protocol. https://datatracker.ietf.org/drafts/Internet Draft/draft-ietf-hip-base-07 . 2007 被引量:1
  • 7HENDERSON T,NIKANDER P.Using HIP with legacy applications. https://datatracker.ietf.org/drafts/Internet Draft/draft-ietf-hip-applications-00 . 2006 被引量:1
  • 8HENDERSON T,GURTOV A.HIP experiment report[]..2007 被引量:1
  • 9AURA T,,NAGARAJAN A,GURTOV A.Analysis of the HIP base exchange protocol[].ACISP’:Proceedings ofth Australasian Conference on Information Security and Privacy.2005 被引量:1
  • 10NIKANDER P,LAGANIER J.Host Identity Protocol(HIP)domain name system(DNS)extensions. https://datatracker.ietf.org/drafts/Internet Draft/draft-ietf-hip-dns-08 . 2006 被引量:1

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部