期刊文献+

IP追踪中概率包标记算法研究 被引量:2

Research on PPM algorithm for IP traceback
下载PDF
导出
摘要 在对概率包标记算法分析的基础上给出了一种动态概率包标记策略ADPPM。该算法利用标记域中的distance域确定标记概率,并采用点标记与边标记的结合对封包进行标记,提升了封包来源回溯的效率,让受害者用最少的反查信息就可以重建攻击路径。实验测试结果表明,该方案可以减少反查所需的封包数,因而减少反查所需时间,可以更有效地发现攻击源。 Based on analyzing the probabilistic packet marking, a dynamic probabilistic marking scheme (ADPPM) is given. By using the distance area of marking space and node-edge probabilistic packet marking algorithm, the ADPPM reconstruct the path with less packets. Analyses and experiments show the high efficiency of ADPPM.
作者 奚洋 夏洪山
出处 《计算机工程与设计》 CSCD 北大核心 2009年第12期2899-2901,2904,共4页 Computer Engineering and Design
关键词 网络安全 IP追踪 分布式拒绝服务 概率包标记 生存时间 network security IP traceback DDoS PPM (probabilistic packet marking) TTL (time to live)
  • 相关文献

参考文献8

  • 1蒋平,李冬静编著..信息对抗[M].北京:清华大学出版社;北京,2007:269.
  • 2Stefan Savage,David Wetherall,Anna Karlin,et al.Practical network support for IP traceback[J].Computer Communication Review,2000,30(4):295-308. 被引量:1
  • 3Dawn Xiaodong Song, Adrian Perrig. Advanced and authenticated marking schemes for IP traceback[C].Alaska:Proc of the IEEE INFOCOM,2001:878-886. 被引量:1
  • 4Liu Jenshiuh,Lee Zhi-Jian,Chung Yeh-Ching.Dynamic probabilistic packet marking for efficient IP traceback[J].Computer Networks,2007,50(3):866-882. 被引量:1
  • 5李德全,苏璞睿,冯登国.用于IP追踪的包标记的注记(英文)[J].软件学报,2004,15(2):250-258. 被引量:29
  • 6Durresi A,Paruchuri V, Barolli L,et al.Efficient and secure autonomous system based traceback [J]. Journal of Interconnection Networks,2004,5(2): 151-164. 被引量:1
  • 7Dean D,Franklin M,Stubbletield A.An algebraic approach to IP traceback[C].Network and Distributed System Security Symposium Conference Proceedings,Diego Supercomputer Center,2001:1-10. 被引量:1
  • 8Park K,Lee H.On the effectiveness of probabilistic packet marking for IP traekbaek under denial of service attack[C].Alaska: Proc of the IEEE INFOCOM,2001:338-347. 被引量:1

二级参考文献19

  • 1CERT.CERT Statistics.http://www.cert.org/stats/#incidents 被引量:2
  • 2Park K,Lee H.A proactive approach to distributed DoS attack prevention using route-based packet filtering.Technical Report,CSD00-017,Department of Computer Sciences,Purdue University,2000.http://www.cs.purdue.edu/nsl/dpf-tech.ps.gz 被引量:2
  • 3Savage S,Wetherall D,Karlin A,Anderson T.Practical network support for IP traceback.In:Proc.of the 2000 ACM SIGCOMM Conf.Stockholm,2000.295-306.http://www.acm.org/sigs/sigcomm/sigcomm2000/conf/paper/sigcomm2000-8-4.ps.gz 被引量:2
  • 4McGuire D,Krebs B.Attack on Internet called largest ever.2002.http://www.washingtonpost.com/ac2/wp-dyn/A828- 2002Oct22? 被引量:1
  • 5Lemos R.Attack targets info domain system.ZDNet News,2002.http://zdnet.com.com/2100-1105-971178.html 被引量:1
  • 6CERT.Overview of attack trends,2002.http://www.cert.org/archive/pdf/attack_trends.pdf 被引量:2
  • 7Ferguson P,Senie D.rfc2827,Network ingress filtering:defeating denial of service attacks which employ IP source address spoofing.IETF,May 2000.http://www.ietf.org/rfc/rfc2827.txt 被引量:2
  • 8Song DX,Perrig A.Advanced and authenticated marking schemes for IP traceback.In:Proc.of the IEEE INFOCOM 2001.http://www.ieee-infocom.org/2001/program.html 被引量:1
  • 9Park K,Lee H.On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack.In:Proc.of the IEEE INFOCOM 2001.2001.338-347.http://www.ieee-infocom.org/2001/program.html 被引量:1
  • 10Snoeren AC,Partridge C,Sanchez LA,Jones CE,Tchakountio F,Kent ST,Strayer T.Hash-Based IP traceback.In:Proc.of the ACM SIGCOMM 2001 Conf.2001.San Diego,2001.3-14.http://www.acm.org/sigs/sigcomm/sigcomm2001/p1.html 被引量:2

共引文献28

同被引文献30

  • 1曲海鹏,李德全,苏璞睿,冯登国.一种分块包标记的IP追踪方案[J].计算机研究与发展,2005,42(12):2084-2092. 被引量:9
  • 2曲海鹏,冯登国,苏璞睿.基于有序标记的IP包追踪方案[J].电子学报,2006,34(1):173-176. 被引量:6
  • 3陈星星,徐红云.IP追踪中PPM算法的改进研究[J].计算机工程,2006,32(21):164-166. 被引量:5
  • 4MA Ting.A link signature based DDoS attacker tracing algorithm under IPv6[J].International Journal of Security and Its Applications,2009,3(2):27-36. 被引量:1
  • 5BURCH H,CHESWICK B.Tracing anonymous packets to their approximate source[C]//Proc of the 14th Conference on Systems Administration.[S.l.]:USENIX Association,2000:319-327. 被引量:1
  • 6SAVAGE S,WETHERALL D,KARLIN A,et al.Network support for IP traceback[J].ACM/IEEE Trans on Networking,2001,9(3):226-237. 被引量:1
  • 7SONG D X,PERRIG A.Advanced and authenticated marking schemes for IP traceback[C]//Proc of the 20th Annual Joint Confe-rence on IEEE Computer and Communications Societies.[S.l.]:IEEE Press,2001:878-886. 被引量:1
  • 8PARK K,LEE H.A proactive approach to distributed DoS attack prevention using route based packet filtering,CSD00-017[R].West Lafayette:Purdue University,2000. 被引量:1
  • 9SNOREN A C,PARTRIDGE C,SANCHEZ L A.Hash-based IP traceback[C]//Proc of Conference on Application,Technologies,Architectures,and Protocols for Computer Communications.New York:ACM,2001:3-14. 被引量:1
  • 10SAVAGE S,WETHHERALL D,KARLIN A,et al.Practical network support for IP traceback[J].ACM SIGCOMM Computer Commuaication Review,2000,30(4):295-306. 被引量:1

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部