期刊文献+

网络编码中ACK类攻击的防御研究 被引量:3

Research for ACK Attacks in Network Coding
下载PDF
导出
摘要 近年来,网络编码以其巧妙的思想展现出生机勃勃的应用前景,但是安全问题一直是其在网络中大规模应用的最大障碍.本文分析了网络编码中存在的特有的ACK类攻击,给出了针对该类攻击的基于典型集和哈希函数以及马尔可夫模型的防御方法,并利用数据挖掘的方法获得了典型集的元素组成,同时分析了TCP流中ACK状态数的分布,展望了网络编码的发展方向. In recent years, network coding has emerged some exciting future because of its smart technology. However, in order to let network coding become popular in the INTERNET, its security problem must be solved. Firstly, this paper gives one proposal for ACK attacks based on Typical Set, Hash Functions and Markov model, and find elements of the Typical Set using DATA Mining. Secondly, this paper analyses distribution of status for ACK in TCP stream. Finally , the open issues and challenges for network coding in the future are discussed.
出处 《小型微型计算机系统》 CSCD 北大核心 2011年第7期1354-1359,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金(广东联合基金)重点项目(U0735002)资助 国家自然科学基金项目(60970146)资助 国家"八六三"高技术研究发展计划基金项目(2007AA01Z449)资助
关键词 网络编码 ACK类攻击 典型集 哈希函数 马尔科夫模型 network coding ACK attacks typical set Hash function Markov model
  • 相关文献

参考文献21

  • 1Ahlswcdc R, Cai N, Li S Y R, ct al. Network information flow [ I]. IEEE Trans on Information Theory,2000, 46(4) : 1204-1216.
  • 2Li S Y R,Ycung R W, Cai N. Linear network coding[I]. IEEE Trans on Information Theory, 2003, 49(2) :371-381.
  • 3Crovella E, Bestavros A. Self-similarity in world wide web traffic: evidence and possible causes [ J ]. IEEE/ACM Trans. Network, 1997,5(6) :835-846.
  • 4Leland W E, Taqqu M S, WiUinger W, et al. On the self-similar nature of ethemet traffic (Extended Version ) [ J ]. IEEE/ACM Trans. Network. ,1994, 2(1) :1-15.
  • 5Paxson V, Floyd S. Wide area traffic : the failure of poisson model- ing[ J] IEEE/ACM Trans. Network., 1995,4(3 ) :209-223.
  • 6Liu Wai-xi, Yu Shun-zheng. Secure network coding : challenges and solution [ J]. Computer Science,38 (6) :90-96.
  • 7Tracey Ho, Dcsmond Sui Lan. Network coding: an introduction [ M]. Cambridge University Press,2008,49-60.
  • 8John W Byers , Michael Luby. A digital fountain approach to relia- ble distribution of bulk data[ C ]. Proceedings of the ACM SIG- COMM '98 Conference on Applications, Technologies, Architec- tures, and Protocols for Computer Communication, August 31-Sep- tember 04, Vancouver, British Columbia, Canada, 1998, 55-67.
  • 9Jing Dong, Reza Curtmola. Secure network coding for wireless mesh networks: threats, challenges, and directions[J]. Computer Communications, November,2009,32( 17 ) :1790-1801.
  • 10Chachulski S, Jennings M, Katti S, et al. Trading structure for ran- domness in wireless opportunistic muting [ C ]. Proe. of ACM SIGCOMM'07, 2007.

同被引文献8

引证文献3

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部