期刊文献+

分布式时间戳同步技术的改进 被引量:11

Improvement of distributed timestamp synchronization
下载PDF
导出
摘要 分布式时间戳同步(DTS,distributed timestamp synchronization)技术能够较好地满足端信息跳变的同步需求,但仍存在一定程度的同步失败。对DTS技术进行了改进(IDTS,improved DTS):额外开启一个前置和一个后置端信息用于接收同步失败的数据分组。首先构建了端信息跳变系统的服务模型并给出了IDTS技术的通信协议,在此基础上分析说明了IDTS技术的有效性和安全性,最后通过实验验证了IDTS技术的实践价值。 Distributed timestamp synchronization (DTS) could satisfy the requirement of synchronization for end hop- ping, but still had some degree failure of synchronization. An improved scheme of DTS (say IDTS) was proposed by pro- viding two additional endpoints to receive the unsynchronized packets. It established models and definitions for end hop- ping system at first, then provided protocol for IDTS, analyzed the effectiveness and security of IDTS. Finally, the em- pirical results show the practical value of IDTS.
出处 《通信学报》 EI CSCD 北大核心 2012年第10期110-116,共7页 Journal on Communications
基金 国家自然科学基金资助项目(60973141 61272423) 国家重点基础研究发展计划("973"计划)基金资助项目(2013CB834204) 高等学校博士学科点专项科研基金资助项目(20100031110030)~~
关键词 网络防护 端信息跳变 同步技术 分布式时间戳同步技术 network defense end hopping synchronization technology distributed timestamp synchronization
  • 相关文献

参考文献12

  • 1杨雅辉,姜电波,沈晴霓,夏敏.基于改进的GHSOM的入侵检测研究[J].通信学报,2011,32(1):121-126. 被引量:24
  • 2钟婷,刘勇,李志军,秦志光.基于网络处理器的IPv4/IPv6综合防火墙体系结构研究[J].通信学报,2006,27(2):142-146. 被引量:2
  • 3PING W, LEI W, RYAN C. Honeypot detection in advanced botnet attacks[J]. International Journal of Information and Computer Security, 2010, 4(1): 30-51.
  • 4LEE K, CAVERLEE J, WEBB S. The social honeypot project: pro- tecting online communities from spammers[A]. Proceedings of The 19th International Conference on World Wide Web[C]. Piscataway, N~ USA: IEEE, 2010. 1139-1140.
  • 5石乐义,贾春福,吕述望.基于端信息跳变的主动网络防护研究[J].通信学报,2008,29(2):106-110. 被引量:45
  • 6石乐义,贾春福,吕述望.服务跳变抗DoS机制的博弈理论分析[J].电子与信息学报,2009,31(1):228-232. 被引量:7
  • 7FUJI R, FUJIWARA Y, JIMBO M, et al. Sets of frequency hopping sequences: bounds and optimal constructions[J]. IEEE Transactions on Information Theory, 2009, 55(7): 3297-3304.
  • 8JIAN Z, XIN Y W, XIAO G N. Performance analysis of frequency hopping communication system synchronization[EB/OL], http://www. Scientific.net/AMR.403-408.59.
  • 9PH1LIPP S, ROGER W. Gradient clock synchronization in wireless sensor networks[A]. Proceedings of the 2009 International Conference on Information Processing in Sensor Networks[C]. San Francisco, USA. Piscataway, NJ, USA, 2009.37-48.
  • 10ARUN K T, AJAY A, YASHPAL S. An approach towards secure and multihop time synchronization in wireless sensor network[J]. Commu- nications in Computer and Information Science, 2010, 101(2): 297-302.

二级参考文献44

  • 1贾春福,钟安鸣,张炜,马勇.网络安全不完全信息动态博弈模型[J].计算机研究与发展,2006,43(z2):530-533. 被引量:11
  • 2卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:234
  • 3李树军.基于协议转变的拒绝服务攻击技术的研究[J].计算机应用,2006,26(10):2323-2325. 被引量:4
  • 4Savage S, Wetherall D, and Karlin A, et al.. Practical network support for ip traceback. Proc. ACM SIGCOMM 2000. New York, 2000: 295-306.
  • 5Bellovin S. The ICMP traceback message, http://www. research.att.com, 2000.
  • 6Ferguson P and Senie D. Network ingress filtering: Defeating denial of service attacks which employs ip source address spoofing, http://www.ietf.org/rfc/rfc2267.txt, 1998.
  • 7SANS Institute. Egress filtering, http://www.sans.org/y2k /egress.htm, 2000.
  • 8Wang J and Lu L. Tolerating denial of service attacks using overlay networks: Impact of overlay network topology. Proc. 1st ACM Workshop on Survivable and Serf-Regenerative Systems, Fairfax VA, 2003: 43-52.
  • 9Lee H C J and Thing V L L. Port hopping for resilient networks. Proc. 60th IEEE Vehicular Technology Conference, Washington, 2004: 3291-3295.
  • 10Atighetchi M, Pal P, and Webber F, et al.. Adaptive use of network-centric mechanisms in cyber-defense. Proc. 6th IEEE Int'l Syrup. Object-Oriented Real-Time Distributed Computing, Hokkaido, 2003: 183-192.

共引文献73

同被引文献72

引证文献11

二级引证文献72

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部