期刊文献+

分层次的无状态单分组IP溯源技术 被引量:2

Hierarchical stateless single-packet IP traceback technique
下载PDF
导出
摘要 提出了一种分层次的无状态单分组IP溯源(HSSIT)技术。该技术实现了在域间和域内两级粒度上攻击路径的重构,且网络核心不存储分组的任何数据,其主要思路为:对分组头空闲字段重定义,以GBF数据结构记录各分组所经历的路径摘要信息(即路由器AS号和IP地址信息),重构路径时先利用GBFAS确定攻击源AS,然后由该AS内的边界路由器再利用GBFIP确定距离攻击源最近的路由器。分别从理论分析和模拟测试两方面,将HSSIT与PPM、SPIE、ASEM等技术进行性能比较,其结果表明,HSSIT在对抗节点摘要信息的篡改和伪造方面有更强的顽健性,在收敛性方面也有很大改善。最后,还对更一般情形下(即AS路径长度常在3~7之间)的DoS攻击路径进行了验证性重构,其域间和域内路径重合度分别为100%~98%和98%~90%,结果表明,HSSIT技术能准确重构攻击路径,实现对攻击源的溯源目的。 A novel hierarchical stateless single-packet IP traceback(for short HSSIT) technique was proposed.It not only implements the attack-path reconstruction of two level granularities(i.e.,inter-domain and intra-domain),but also need not store any data in the core node.HSSIT redefines the optional field of IP packet head to store the digest information(including IP address and AS number) of path traveled by each IP packet in GBF data structure.As soon as the path re-construction required,the victim can find the attack-rooted AS using GBFAS.And then the border router within the at-tack-rooted AS can easily search out the nearest router to the attack source using GBFIP.Compared with PPM,SPIE and ASEM by theory analysis and simulations,the results show that HSSIT outperforms in terms of robustness against tam-pering and counterfeiting node digest information,and the convergence.Finally,the attack-path reconstruction experi-ments for the general case(i.e.,AS path length about 3~7) show that HSSIT's inter-domain coincidence degrees and in-tra-domain ones between original attack-path and reconstructed attack-path are within the ranges 100%~98% and 98%~90%,respectively.The experiments results demonstrate that HSSIT is able to accurately reconstruct attack-path to realize the traceback of attack source.
出处 《通信学报》 EI CSCD 北大核心 2011年第3期150-157,共8页 Journal on Communications
基金 国家重点基础研究发展计划("973"计划)基金资助项目(2007CB310706) 国家自然科学基金资助项目(60873263 60932005) 国家高技术发展计划("863"计划)基金资助项目(2009AA01Z215) 四川省青年基金资助项目(09ZQ026-032) 教育部新世纪优秀人才计划基金资助项目(NCET-09-0268)~~
关键词 拒绝服务攻击 通用布隆过滤器 HSSIT IP溯源 denial of service attack generalized Bloom filter HSSIT IP traceback
  • 相关文献

参考文献16

  • 1MORRIS R T. A Weakness in the 4.2 BSD UNIX TCP/IP Software[R]. Computer Science Technical Report No.117, AT&T Bell Labs, 1985. 被引量:1
  • 2MOORE D, VOELKER G, SAVAGE S. Inferring Intemet denial-of-service activity[A].The 10th ACK USENIX Security Symposium[C]. Washington D C, 2002. 被引量:1
  • 3SAVADE S, WETHERALL D, KARLIN A, et al. Practical network support for IP traceback[A]. Proc of ACM SIGCOMM[C]. 2000. 295-306. 被引量:1
  • 4SNOREN A, PARTRIDGE C, SANCHEZ A, et al. Single-packet IP traceback[J]. ACM/IEEE Trans on Networking, 2002, 10(6): 721-734. 被引量:1
  • 5GAO Z Q, ANSARI N. A practical and robust Inter-domain marking scheme for IP traceback[J]. Computer Networks, 2007, 51(3): 732-750. 被引量:1
  • 6JIN G, YANG J G, WEI W, et al. Across-domain deterministic packet marking for IP traceback[A]. Second International Conference on Communications and Networking in China[C]. 2007.382-386. 被引量:1
  • 7KORKMAZ T, GONG C, SARAC K, et al. Single packet IP trace back in AS-level partial deployment scenario[A]. IEEE Globecom[C] 2007.95-108. 被引量:1
  • 8BELENKY A, ANSARI N. IP traceback with deterministic packet marking[J].IEEE Communication Letters, 2003, 7(4): 162-164. 被引量:1
  • 9QU Z Y, HUANG C F. A novel deterministic packet marking scheme for IP traceback[A]. Power Electronics and Intelligent Transportation System[C]. 2008. 897-883. 被引量:1
  • 10BLOOM B H. Space/time trade-Offs in hash coding with allowable errors[J]. Communication ACM, 1970, 13(7): 422-426. 被引量:1

二级参考文献8

  • 1BELLOVIN S M. ICMP traceback messages[EB/OL]. Intemet Draft:http://www.ieff. org/proccedings/01dec/I-D/draft-ieff-itrace-01.txt. 被引量:1
  • 2STONE R. Centertrack: an IP overlay network for tracking DoS floods[A]. Proc 9th USENIX Sec Symp[C]. 2000.199-212. 被引量:1
  • 3SAVAGE S, et al. Network support for IP traceback[J]. IEEE/ACM Transactions on Networking, 2001,9(3):226-237. 被引量:1
  • 4DAWN X D, SONG P A. Advanced and authenticated marking schemes for IP traceback[A]. INFOCOM 2001, Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies[C]. 2001. 878-886. 被引量:1
  • 5EAN D, FRANKLIN M, STUBBLEFIELD A. An algebraic approach to IP traceback[J]. ACM Transactions on Information and System Security (TISSEC), 2002,5(2): 119-137. 被引量:1
  • 6LIU J, LEE Z J, CHUNG Y C. Efficient dynamic probabilistic packet marking for IP traceback[A]. Networks, ICON2003[C]. 2003.475-480. 被引量:1
  • 7PARK K, LEE H. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack[A]. INFOCOM 2001,Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies[C].2001.338-347. 被引量:1
  • 8梁丰,赵新建,David Yau.通过自适应随机数据包标记实现实时IP回溯(英文)[J].软件学报,2003,14(5):1005-1010. 被引量:22

共引文献12

同被引文献14

  • 1朱晓建,刘渊,李秀珍.基于非重复包标记的IP追踪研究[J].计算机应用,2007,27(11):2694-2695. 被引量:3
  • 2CONVERY S.网络安全体系结构[M].田果,刘丹宁,译.北京:人民邮电出版社,2013:234-245. 被引量:1
  • 3BASKAR M,GNANASEKARAN T,SARAVANAN S.Adaptive IP traceback mechanism for detecting low rate DDoS attacks[C]//ICE-CCN:Proceedings of the 2013 International Conference on Emerging Trends in Computing,Communication and Nanotechnology.Piscataway:IEEE,2013:373-377. 被引量:1
  • 4FOROUSHANI V A,ZINCIR-HEYWOOD A N.TDFA:traceback-based defense against DDoS flooding attacks[C]//Proceedings of the 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.Piscataway:IEEE,2014:597-604. 被引量:1
  • 5KIREMIRE A R,BRUST M R,PHOHA V V.Topology-dependent performance of attack graph reconstruction in PPM-based IP traceback[C]//Proceedings of the 2014 IEEE 11th Consumer Communications and Networking Conference.Piscataway:IEEE,2014:363-370. 被引量:1
  • 6SAVAGE S,WETHERALL D,KARLIN A,et al.Practical network support for IP traceback[J].ACM SIGCOMM Computer Communication Review,2000,30(4):295-306. 被引量:1
  • 7SONG D X,PERRIG A.Advanced and authenticated marking schemes for IP traceback[C]//INFOCOM 2001:Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies.Piscataway:IEEE,2001,2:878-886. 被引量:1
  • 8PENG T,LECKIE C,RAMAMOHANARAO K.Adjusted probabilistic packet marking for IP traceback[C]//NETWORKING 2002:Proceedings of the Second International IFIP-TC6 Networking Conference on Networking Technologies,Services,and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications,LNCS 2345.Berlin:Springer,2002:698-708. 被引量:1
  • 9LIU J,LEE Z-J,CHUNG Y-C.Dynamic probabilistic packet marking for efficient IP traceback[J].Computer Networks,2007,51(3):866-882. 被引量:1
  • 10STUART M,JOEL S,GEORGE K.黑客大曝光[M].7 版.赵军,张云春,陈红松,等译.北京:清华大学出版社,2013:692-695. 被引量:1

引证文献2

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部