期刊文献+

网络入侵追踪研究综述 被引量:12

A Summary of Network Intrusion Traceback
下载PDF
导出
摘要 1引言 在制定目前Internet上使用的网络协议标准时,设计者们更多的是考虑到网络协议的可靠性和可扩展性,而不是它们所提供的安全服务和审计功能. Traceback system is a system for finding the hacker's real location on the network autonomously. It can be divided into two kinds: IP Packet Traceback system, and Connection Traceback system. The goal of IP Packet Traceback system is to traceback the Real Source that send the IP Address Spoofed packet,focused in the method that uses the intermediate routers. The Connection Traceback system traceback the Real Source of Detoured Intrusion,the detoured attack is an attack that is done via several systems. Because of more and more attackers emerging in recent years, the model that can apply to the current Internet should be developed,and Real-time traceback system is needed to actively defense the hacking.
作者 张静 龚俭
出处 《计算机科学》 CSCD 北大核心 2003年第10期155-159,共5页 Computer Science
基金 国家自然科学基金 90104031
关键词 计算机网络 网络安全 入侵检测系统 路由器 网络入侵追踪系统 Network intrusion detection, Intrusion traceback
  • 相关文献

参考文献15

  • 1Heberlein L T, Bishop M. Attack class : Address spoofing. Natl.Information Systems Security Conf. , Oct. 1996. 371~378. 被引量:1
  • 2Ferguson F,Senie D. Network ingress filtering: Defeating denial-of-service attackswhich employ IP source address spoofing. RFC2827,2000. 被引量:1
  • 3Stone R. CenterTrack: An IP overlay network for tracing DoS floods. In:Proc. 2000 USENIX Security Syrup, July 2000. 199~212. 被引量:1
  • 4Savage S, et al. Network Support for IP Traceback. IEEE/ACM TRANSACTIONS ON NETWORKING, 2001,9 (3). 被引量:1
  • 5Bellovin S M. ICMP Traceback Messages. Internet Draft:Draftbellovin-itrace-00, txt, 2000. 被引量:1
  • 6Jung H T,et al. Caller id system in the internet environment. In:UNIX Security Symposium IV Proc. 1993.69~78. 被引量:1
  • 7Buchholz F,et al. CERIAS , Purdue University: [Packet Tracker Final Report]. 被引量:1
  • 8Venema W. TCP wrappers. 被引量:1
  • 9Zhang Y, Paxson V. Detecting Stepping Stones. Ins Proc. of 9^th USENIX Security Symposium, 2000. 被引量:1
  • 10Yoda K, Etoh H. Finding a Connection Chain for Tracing Intruders. IBM Tokyo Research Laboratory. 被引量:1

同被引文献45

  • 1李德全,徐一丁,苏璞睿,冯登国.IP追踪中的自适应包标记[J].电子学报,2004,32(8):1334-1337. 被引量:33
  • 2李道国,苗夺谦,张红云.粒度计算的理论、模型与方法[J].复旦学报(自然科学版),2004,43(5):837-841. 被引量:41
  • 3王锐等译.网络最高安全技术指南.第1版,北京:机械工业出版社.1999:371-465. 被引量:1
  • 4L.T. Heberlein, M. Bishop. Attack class : Address spoofing[ J] , Natl. Information Systems Security Conf. 1996 (10) :371 - 378. 被引量:1
  • 5R. Stone. Center Track:An IP overlay network for tracing DoS floods, In Proc. 2000 US ENIX Security Syrup ,2000(7 ) :199- 212. 被引量:1
  • 6陈国良.并行计算[M].北京:高等教育出版社,1999.. 被引量:14
  • 7Reith Clint Mark. An examination of digital forensics models. International Journal of Digital Evidence, 2002, 1(3). 被引量:1
  • 8Bryson Curt,Anderson Michael R..Shadow Data—The fifth dimension of data security risk.http://www.forensica—intl.com. 被引量:1
  • 9Warren G.KruseⅡ,Jay G.Heiser.Computer forensics:incident response essentials. 1st Edition,ISBN:0201707195,Pearson Education,Inc,USA. 被引量:1
  • 10Grugq,Scut.Armouring the ELF:Binary encryption on the UNIX platform.Phrack #58 article5.2001,http://www.phrack.org. 被引量:1

引证文献12

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部