期刊文献+

一种改进的iTrace技术的研究 被引量:2

Research on a Improved iTrace Scheme
下载PDF
导出
摘要 针对现有ICMP反向追踪方法中iTrace信息标记的IP地址或相关信息,导致重构完整攻击路径需要过多的数据包,并且计算量大的问题,提出了在iTrace分组中重新编码的方案。该方案可在较短的时间内推算出主要攻击路径,显著减少路径重构时对数据包的需求量,从而可以使受害者更快捷地追踪到攻击源,为受害者尽快响应攻击、减少攻击带来的损失创造了条件。 In existing iTrace schemes, routers' IP address are embedded into iTrace messages, which results in too many packets needed and calculating complexity great to reconstruct the path. The router numbering schemes are given , which takes fewer packets to reconstruct the attack path, and it reconstructs the main attack path in shorter time. Thus the victim could respond to attack more promptly and reduce attack damage.
作者 张婵
出处 《科学技术与工程》 2007年第12期3013-3016,共4页 Science Technology and Engineering
关键词 ICMP反向追踪 拒绝服务攻击 分布式拒绝服务攻击 路由器 ICMP Traceback denial-of-service attack distributed denial-of-service attack router
  • 相关文献

参考文献6

  • 1[1]Ferguson P,Senie D.Network ingress filtering:defeating denial of service attack which employ IP source address spoofing.RFC2817,2000
  • 2[2]Oliver S,Larry P.Defending against denial of service attacks in scout.In:Proceedings of the 1999 USENIX/ACM Symposium on Operating System Design and Implementation Monterey,California,USA,1999
  • 3[3]Bellovin S,et al.ICMP Traceback message,IETF Internet Draft draft-ietf -itrace -04.txt,Feb 2003
  • 4[4]Wu S F.Zhang L.Massey D,et al.On design and evaluation of intention-driven ICM Ptrace back Proc Computer Communications and Networks,2001
  • 5[5]Burch H,Cheswick B.Tracing anonymous packets to their approximate source.In:Proceedings of 2000 USENIX LISA Conference,Seattle,Washington,USA,2000:319-327
  • 6[6]Wang B,Schularinne H.Analysis of denial of service attacks on IP traceback Techniques.IEEE GLOBECOM,Dec.2003

同被引文献52

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部