期刊文献+

基于包标记的DDoS攻击源追踪方案研究

Research on DDoS Attack Source Traceback Scheme Based on Packet Marking
下载PDF
导出
摘要 依据FMS标记思想,结合密码学的数字签名方法,设计了自适应hash签名标记方案AHSM。该方案是在包经过的路由器处,路由器按一个变化的概率对包进行hash签名。采用hash签名,签名速度快、误报率低、重构开销小,实现了IP地址的防篡改和发送者的不可否认,能有效地防止路由器假冒。采用变化的概率,可以减少受害者重构攻击路径时所需的数据包数,提高了追踪速度。 According to the FMS marking idea and using cryptographic digital signature,a self-adaptive hash digital signature marking scheme AHSM is designed,which means that the routers that the packet passed by will give a hash digital signature with a variable probability.Using hash digital signatures,the signature processing speed is fast,false positive is low and the over head of reconstruction attack path is low.It makes the IP address anti-tampered,and makes the user non-deniable.Furthermore it can effectively defend against routers being tampered.With a variable probability,it will take fewer packets to reconstruct the attack path,thus the victim could respond to attack more promptly.
出处 《科学技术与工程》 2011年第1期184-188,共5页 Science Technology and Engineering
基金 贵州大学自青基合字(2009)028号资助
关键词 网路安全 DDOS攻击 包标记 攻击源追踪 network security DDoS attack pack-making attack source-tracing
  • 相关文献

参考文献8

  • 1Aljifri H. IP traceback: a new deniM-of-service deterrent. Security & Privacy Magazine, 2003 ; 1 (2) : 24-31. 被引量:1
  • 2Stone R. Center track : an IP overlay network for tracking DoS floods. In: Proceedings of the 2000 USEN IX Security Symposium, Denver, CO, July 2000:199-212. 被引量:1
  • 3Buch H, Cheswick B. Tracing anonymous packets to their approxi- mate soures. Unpublished Paper, Dec 1999:219-327. 被引量:1
  • 4Sager G. Security fun with OCxmon and cflowd, http: //caida. org/ projects/NGI/content/s, 2002 - 04 - 20/2002 - 09 - 10. 被引量:1
  • 5Savage S, Wetherall D. Practical network support for IP traceback. Proceedings of the 2000 A CM SIGCOMM Conference. New York: ACM Press ,2000:295-306. 被引量:1
  • 6Snoeren A C, Partrdge C, Sanchez L A, et al. Hash-based IP trace- back. In: Proc ACM SIGCOMM 2001, Aug, 2001 : 3-14. 被引量:1
  • 7Stoica I, Zhang H. Providing guaranteed services without per flow management. In: Proc ACM SIGCOMM 1999, MA, 1999:81-94. 被引量:1
  • 8Boneh A, Hofri M. The coupon-collector problem revisited. Commun Statist Stochastic Models, 1997 ; 13 ( 1 ) : 39-66. 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部