期刊文献+

网络攻击源的反向追踪技术 被引量:1

The Technology of Opposite-direction Track for Network Attack Source
下载PDF
导出
摘要 攻击源反向追踪技术是信息安全领域应急响应的关键技术,在当前的互联网协议体系下,该技术存在很多问题亟待解决。本文对该领域近年来所取得的进展及采用的关键技术进行了全面阐述,并对下一步的研究方向进行了展望。 The technology of opposite-direction track for network attack source is the key to the immediate reaction of the infor- mation security field.There are still some problems need to be solved under the present network protocol system.This paper comprehensively described the development of this filed in recent years and the key technology it adopted,and also put forward its prospect.
作者 张艳萍
出处 《微型电脑应用》 2007年第7期62-64,6,共3页 Microcomputer Applications
基金 黑龙江省新世纪高等教育教改工程重点项目"黑龙江省高校网络教育教学的开发与研究"项目
关键词 信息安全 网络攻击源 反向追踪 Information security Network attack source Opposite-direction track
  • 相关文献

参考文献12

  • 1Howard F.Lipson.Tracking and Tracing Cyber-Attacks:Technical Challenges and Global Policy Issues[EB/OL].http://www.cert.org/archive/pdf/02sr009.pdf.November 2002.
  • 2Vadim Kuznetsov,Andrei Simkin,Helena Sandstrom.An evaluation of different IP traceback approaches[EB/OL].http://www.sm.luth.se/csee/csn/publications/ip-traceback.pdf.October 1,2002.
  • 3Cisco System.Characterizing and Tracing Packet Floods Using Cisco Routers[EB/OL].http://www.cisco.com/warp/public/707/22.pdf.April 9,2001
  • 4Stone,Robert.CenterTrack:An IP Overlay Network for Tracking DoS Floods[A].P.199-212.9th USENIX Security Symposium[C].Denver,Colorado,August 14-17,2000.
  • 5Ferguson,P.& Senie,D.RFC 2827:Network Ingress Filtering:Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing.Network Working Group,IETF[EB/OL].http://www.ietf.org/rfc/rfc2827.txt.May 2000.
  • 6Morrow,Chris.BlackHole Route Server and Tracking Traffic on an IP Network.UUNET,WorldCom,Inc[EB/OL].http://www.secsup.org/Tracking.
  • 7BELLOVIN,Steve ; Leech,Marcus ; & Taylor,Tom.ICMP Traceback Messages.Internet Engineering Task Force(IETF) Draft-Work in Progress[EB/OL].ftp://ftp.ietf.org/Internet-drafts/draft-ietf-itrace-01.txt.October 2001.
  • 8Savage,Stefan; Wetherall,David; Karlin,Anna R.; & Anderson,Tom.Practical Network Support for IP Traceback[A].p.295-306.Proceedings of ACM SIGCOMM 2000[C].Stockholm,Sweden,Aug.28-Sept.1,2000.New York:Association for Computing Machinery,2000[DB/OL].http://www.acm.org/sigcomm/sigcomm2000/conf/abstract/8-4.htm.
  • 9Song,Dawn & Perrig,Adrian.Advanced and Authenticated Marking Schemes for IP Traceback[A].p.878-886.IEEE Infocom 2001[EB/OL].http://www.ieeeinfocom.org/2001.
  • 10Waldvogel,Marcel.GOSSIB vs.IP Traceback Rumors.Research Report RZ3424 (# 93671)[R],IBM Research,Zurich Research Lab,June 17,2002.Proceedings of the 18th Annual Computer Security Applications Conference[J/OL],Las Vegas,Nevada,December 9-13,2002.http://www.acsac.org.

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部