期刊文献+

基于STiP模型的安全主机标识及认证协议

Secure Host Identifier and Authentication Protocol for STiP
下载PDF
导出
摘要 为了构建自主可控、安全可信的互联网环境,我们提出了一种安全可信的网络互联协议(STi P)模型。本文详细介绍了STi P模型的层次结构,然后定义了基于STi P模型的报文头格式。此外,设计了终端主机接入协议和映射解析协议,用于终端主机接入的注册,以及在终端主机通信过程中映射信息的更新、查询和响应。 Inorderto builda secureand reliable internet environment with controllability, we proposed a secure and trusted internetprotocol, which is called STiP. In this paper, the network model and the structure ofthe protocol is described in detail. Afterthat, the definition ofthe packet header format is introduced. In addition, the host access protocol is designed for the registration of the STiP based network and the mapping resolution protocol is designed forthe updating, querying and response of mapping information during the communication ofthe hosts.
出处 《网络空间安全》 2017年第2期43-50,共8页 Cyberspace Security
基金 国家自然科学基金资助项目(61540020):"基于多维证据的信任评估理论 模型与关键机制研究" 促进高校内涵发展.学科建设类项目:网络空间安全一级学科硕士学位点申报与建设(5121723600)
关键词 可信网络 网络安全 命名与寻址 互联网协议 认证协议 trusted network network security naming and addressing internet protocol authentication protocol
  • 相关文献

参考文献6

二级参考文献27

  • 1曹蓟光.互联网域名系统管理新机制的研究[J].电信网技术,2005(10):8-12. 被引量:5
  • 2张焕国,罗捷,金刚,朱智强.可信计算机技术与应用综述[J].计算机安全,2006(6):8-12. 被引量:20
  • 3昝风彪,徐明伟,吴建平.主机标识协议(HIP)研究综述[J].小型微型计算机系统,2007,28(2):224-228. 被引量:18
  • 4Kent S, Atkinson R. Security Architecture for the Internet Protocol. IETF, RFC2401. 1998 被引量:1
  • 5Bremler-Barr A, Levy H. Spoofing prevention method. In: Proc IEEE INFOCOM. Washington: IEEE, 2005. 536-547 被引量:1
  • 6Ferguson P, Senie D. Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing. IETF, RFC2827. 2000 被引量:1
  • 7Park K, Lee H. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. ACM SIGCOMM Comput Commun Rev, 2001, 31 (4): 15-26 被引量:1
  • 8Li j, Mirkovic J, Wang M, et al. SAVE: source address validity enforcement protocol. In: Proc IEEE INFOCOM. Washington: IEEE, 2002. 3:1557-1566 被引量:1
  • 9Jin C, Wang H. Hop-count filtering: an effective defense against spoofed DDoS traffic. In: Proc ACM CCS. New York: ACM, 2003. 30-41 被引量:1
  • 10Snoeren A, Partridge C, Sanchez L, et al. A Hash-based IP traceback. ACM SIGCOMM Comput Commun Rev, 2001, 31(4): 3-14 被引量:1

共引文献52

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部