期刊文献+

域间IP欺骗防御服务扩展

原文传递
导出
摘要 拒绝服务攻击严重影响Internet的可用性,而攻击者通常采用源IP欺骗方式,使得网络防御更加困难.尽管已经提出许多防御IP欺骗的机制,但只是部分部署,防御效果差.本文首次提出一种域间IP欺骗防御服务扩展机制-MASK,在给定防御节点覆盖的情况下,延伸防御机制保护范围,增强节点的防御能力.借鉴Transit-Stub AS模型,根据BGP消息MASK节点代理邻居中Stub AS与目的端AS协商标识,共享源IP地址空间信息,向Stub AS提供IP欺骗防御服务.同时利用BGP消息约束源-目的端之间MASK会话数,减小了标识的计算和存储开销.MASK不仅扩大了防御机制保护范围,且提前过滤了IP欺骗数据流.应用Routeview提供的RIB进行评估,MASK在相同覆盖下能够扩展IP欺骗防御机制的保护范围,是一种高效的域间IP欺骗防御机制,可为建设新一代可信网络提供有力支撑.
出处 《中国科学(E辑)》 CSCD 北大核心 2008年第10期1636-1651,共16页 Science in China(Series E)
基金 国家重点基础研究发展计划(批准号:2003CB314802 2005CB321801)资助项目
  • 相关文献

参考文献20

  • 1Beverly R, Bauer S. The spooler project: inferring the extent of source address filtering on the Internet. In Usenix Sruti 2005. Cambridge: USENIX Press, 2005. 53-59
  • 2Koponen T, Chawla M, Chun B G, et al. A data-oriented (and beyond) network architecture. In: SIGCOMM 2007. Kyoto: ACM Press, 2007
  • 3Guha S, Francis P. An end-middle-end approach to connection establishment. In: SIGCOMM 2007. Kyoto: ACM Press, 2007
  • 4Duan Z H, Yuan X, Chandrashekar J. Constructing inter-domain packet filters to control IP spoofing based on Bgp updates. In: INFOCOM 2006. Barcelona: IEEE Press, 2007
  • 5Bremler A, Levy H. Spoofing prevention method. In: INFOCOM 2005. Miami: IEEE Press, 2005
  • 6Lee H, Park K. On the effectiveness of probabilistic packet marking for IP traceback under denial of service at- tack. In: INFOCOM 2001. Anchorage: IEEE Press, 2001. 338-347
  • 7Ferguson P, Senie D. Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ Ip Source Address Spoofing. RFC 2267. 1998
  • 8Moore D, Voeker G M, Savage S. Inferring Internet denial-of-service activity. In: USENIX Security Symposium 2001. USENIX Press, 2001.9-22
  • 9Zegura E, Calvert K, Donahoo M. A quantitative comparison of graph-based models for Internet topology. IEEE/ACM Trans Netw, 1997, 5(6): 770-783
  • 10卢锡城,赵金晶,朱培栋,董攀.域间路由系统自组织特性[J].软件学报,2006,17(9):1922-1932. 被引量:10

二级参考文献36

  • 1Prehofer C, Bettstetter C. Self-Organization in communication networks: Principles and design paradigms. IEEE Communications Magazine, 2005,43(7):78-85.
  • 2Alderson D, Willinger W. A contrasting look at self-organization in the Internet and next-generation communication networks.IEEE Communications Magazine, 2005,43(7)'94-100.
  • 3Siganos G, Faloutsos M, Faloutsos P, Faloutsos C. Power-Laws and the AS-level Internet topology. IEEE/ACM Trans. on Networking, 2003,11:514-524.
  • 4Zegura, E Calvert K, Donahoo M. A quantitative comparison of graph-based models for Internet topology. IEEE/ACM Trans. on Networking, 1997,5(6):770-783.
  • 5Subramanian L, Agarwal S, Rexford J, Katz R.H. Characterizing the Internet Hierarchy from multiple vantage points. In: Proc. of the IEEE INFOCOMM 2002. 2002.618-627.
  • 6Tauro SL, Palmer C, Siganos G, Faloutsos M. A simple conceptual model for the Internet topology. In: Proc. of the IEEE GLOBECOM 2001. 2001. 1667-1671.
  • 72005. http://www.caida.org/analysis/topology/
  • 8Huston G. Interconnection, peering, and settlements. Internet Protocol Journal, 1999,45(3):136-152.
  • 9Kleinrock L, Kamoun F. Hierarchical routing for large networks: Performance evaluation and optimization. Computer Networks,1977,1:155-174.
  • 10Waxman B. Routing of multipoint connections. IEEE Journal on Selected Areas in Communications, 1988,6(9):1617-1622.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部