期刊文献+

基于包标记的DDoS主动追踪模型设计

下载PDF
导出
摘要 在DDoS攻击中,攻击者通常采用伪造的IP源地址,这样就使得确定攻击的IP源十分困难。本文提出了基于包标记的DDoS主动追踪模型,不仅能够进行IP追踪,还可以在攻击进行时削弱攻击造成的影响。
出处 《福建电脑》 2008年第4期117-118,共2页 Journal of Fujian Computer
  • 相关文献

参考文献8

  • 1Bellovin.ICMPTrace back messages[]..
  • 2S.Felix Wu,Jim Yuill.Sleepy Watermark Tracing:An Active Network-Based Intrusion Response Framework. http://seclab.cs.ucdavis.edu//papers/2001-03-watermark-ifipsec.pdf .
  • 3Savage,S.and Wetherall,D,and Anderson.Network Support for IP Trace Back[].IEEE ACM Transactions on Networking.2001
  • 4Lee,W,and Park,K.On the Effectiveness of Probabilistic Packet Markingfor IP Trace Back under Denial of Service Attack. http://www.dsi.uniroma1.it/~dipietro/park01effectiveness_of_marking.pdf .
  • 5Network Ingress Filtering:Defeating Denial of Service Attacks whichemploy IP Source Address Spoofing. http://xml.resource.org/public/rfc/html/rfc2267.html .
  • 6Hal Burch,Bill Cheswick.Tracing Anonymous Packets to their Approxi-mate Source[].IEEE ACM Transactions on Networking.2001
  • 7Glenn Sager.Security Fun with Ocxmon and cflowd[].the Internet Working Group.1998
  • 8Robert Stone.An IP overlay network for tracing DoS flood[].IEEE ACM Transactions on Networking.2001

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部