期刊文献+

概率包标记技术综述 被引量:5

Overview on Probabilistic Packet Marking Technology
原文传递
导出
摘要 防御分布式拒绝服务攻击是目前网络安全的一大难题,在应对分布式拒绝服务攻击的各种措施中,概率包标记技术是一种重要手段,受到了广泛的重视。文章对Savage提出的基本概率包标记以及目前的常见的概率包标记方案进行了分析研究,按照采用的标记手段和方法做了一定的归类并对其性能和效果进行了比较和分析,最后对概率包标记技术的发展趋势作了简单分析和展望。 Distributed Denial-of-Service(DDOS) attack is in among the hardest network problems, and probabilistic packet marking scheme is an important method in among several countermeasures. This paper gives an analysis on basic probabilistic packet marking scheme and some other marking schemes. These schemes are classified according to the marking means, and their performances and practical effects are studied and compared. Finally, the development trend for probabilistic packet marking technology is discussed.
作者 胡长俊
出处 《通信技术》 2009年第2期267-269,共3页 Communications Technology
关键词 分布式拒绝服务攻击 概率包标记 IP追踪 DDOS probabilistic packet marking IP traceback
  • 相关文献

参考文献11

二级参考文献73

  • 1李德全,徐一丁,苏璞睿,冯登国.IP追踪中的自适应包标记[J].电子学报,2004,32(8):1334-1337. 被引量:33
  • 2包怀忠,马季.IP网络路由追踪技术研究[J].微电子学与计算机,2004,21(8):59-62. 被引量:4
  • 3曲海鹏,李德全,苏璞睿,冯登国.一种分块包标记的IP追踪方案[J].计算机研究与发展,2005,42(12):2084-2092. 被引量:9
  • 4Banga G,Dnlsched P,Mogul J.Resource containers:A new facility for resource management in server system.J In:OSDI ed.Proceedings of the 1999 USENIX/ACM Symposium on Operating System Design and Implementation(OSDI'99).New Orleans,LA:OSDI,1999.45-58.
  • 5Spatscheck O.Peterson L.Defending against denial of service attacks in scout In:OSDI,ed.Proceedings of the 1999 USENIX/ACM Symposium on Operationg System Design and Implementation(OSDI'99)New orleans,LA:OSDI,1999,59-72
  • 6Meadows c.A formal framework and evaluation method for network denial of service In:PCSFW,ed.Proceeding.Of the 1999 IEEE Computer Security Foundations Workshop.Mordano IEEE Compmer Society Press,1999.4-13.
  • 7Savage S,Wetherall D,Karlin A,Anderson T.Practical network support for lP traceback.1n:ACM,ed.Proceedings of the ACM SIGCOMM 2000.Sweden:ACM,2000.295-300.
  • 8Song D,Perrig A.Advanced and authenticated techniques for IP traceback In:INFOCOM,ed.Proceedings of the IEEE INFOCOM 2001.Anchorage:INFOCOM,2001
  • 9Mayeda W.Graph Theory.NewYork:Wiley-Interscience,1972.
  • 10Klamkin M,Newmall D.Extensions of the birthday surprise Journal of Combinatorial Theory,1967.279~282.

共引文献86

同被引文献40

  • 1陈周国,蒲石,祝世雄.匿名网络追踪溯源综述[J].计算机研究与发展,2012,49(S2):111-117. 被引量:14
  • 2梁晓初,孙伟.基于认证的DDos攻击源追踪改进方案[J].信息安全与通信保密,2007,29(8):100-102. 被引量:1
  • 3AKYILDIZ I,U W,AYIRCI E.A survey on sensor network[J].IEEE Communications Magazines,2002,40(8):102-114.
  • 4SAVAGE S,WETHERALL D,KARLIN A.Practical network support for IP traceback[C] //Proc of ACM SIGCOMM.2000:295-306.
  • 5SNOEREN A C,ARTRIDGE C,ANZEZ L A.Hash-based IP trace back[C] //Proc of ACM SIGCOMM.2001:3-14.
  • 6JIN X,ZHANG Y,PAN Y,et al.ZSBT:a novel algorithm for tracing DoS Attackers in MANETS[J].EURASIP Journal on Wireless Communications and Networking,2006(2):82.
  • 7THING V,LEE H,SLOMAN M,et al.Enhanced ICMP traceback with cumulative path[C] //Proc of the 61st IEEE Vehicular Techno-logy Conference.2005:2415-2419.
  • 8SY D,BAO Li-chun.CAPTRA:coordinated packet trace back[C] //Proc of the 5th International Conference on Information Processing in Sensor Networks.2006:152-159.
  • 9I SAVAGE S, WETHERALL D, KARLIN A, et al. Network Support for IP Traceback[J]. IEEE/ACM Transaction on Networking, 2001, 9(3): 226-237.
  • 10BELENKY A, ANSARI N. IP Traceback with Deterministic Packet Marking[J]. IEEE Comm. Letter, 2003, 7(4): 162-164.

引证文献5

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部