期刊文献+

多源网络攻击追踪溯源技术研究 被引量:8

Exploration on Attribution of Multi-source Network Attack
原文传递
导出
摘要 网络攻击追踪溯源在定位攻击源、阻止或抑制网络攻击、提供法律举证、威慑攻击者等方面具有非常积极的意义。近年来,学术界对此开展了大量的研究,并提出了多种追踪溯源技术体制。分析了在大规模网络环境下网络攻击追踪溯源所面临的问题,以及当前主要技术体制的优缺点和适用性,提出了融合多种追踪溯源机制的多源追踪溯源技术思路,设计了基于信息融合的扩展性强、易于部署建设的MSNAA网络攻击追踪溯源系统架构。 The attributing technology for network attack plays a key role in locating attack source, stopping or checking attack, providing lawful testimony, and deterring attackers. In this paper, the difficulties for network attack attribution in large-scale network are discussed, and the technical principles and technical characteristics of present attack-tracing approaches are described. Meanwhile the multi-source attributing approach in combination of multiple attributing mechanisms is proposed, and the information fusion-based multi-source network attack attribution architecture of strong scalability and easy deployment also de- signed.
出处 《通信技术》 2013年第12期77-81,共5页 Communications Technology
关键词 网络安全 网络攻击追踪溯源 IP追踪 信息融合 network security network attack attribution IP traceback information fusion
  • 相关文献

参考文献10

  • 1闫巧,雷琼钰.IP追踪新进展[J].小型微型计算机系统,2012,33(9):2027-2032. 被引量:4
  • 2BELLOVIN S M, LEECH M, TAYLOR T. ICMP Traceback Messages [ EB/OL ]. [ 2013-11 - 18 ]. http ://academiccom- mons. columbia, edu/download/fedora _ content/download/ ac : 127254/CONTENT/draft-ietf-itrace-04. txt. pdf.
  • 3SNOEREN A C, PARTRIDGE C, SANCHEZ L A, et al. Hash-based IP Traceback [ C ]//Proceedings of the 2001 Conference on Applications, Technologies, Architec- tures, and Protocols for Computer Communications. San Diego, California, USA: ACM, 2001: 3-14.
  • 4胡长俊.概率包标记技术综述[J].通信技术,2009,42(2):267-269. 被引量:5
  • 5陈周国,蒲石,祝世雄.匿名网络追踪溯源综述[J].计算机研究与发展,2012,49(S2):111-117. 被引量:14
  • 6KIYAVASH N, HOUMANSADR A, BORISOV N. Multi Flow Attacks Against Network Flow Watermarking Schemes[ C l// Proceedings of 17th USENIX Security. San Jose : USENIX Association, 2008:307-320.
  • 7占勇军,谢冬青,周再红,罗莉莉.IPv6下基于改进的SPIE源追踪方案[J].计算机工程与科学,2007,29(4):11-13. 被引量:5
  • 8朱田,田野,马迪,毛伟.基于包验证的面向IPv6翻译机制的IP追溯方法[J].计算机应用,2013,33(4):926-930. 被引量:3
  • 9CHAO Gong, SARAC K. A More Practical Approach for Single Packet IP Traceback Using Packet Logging and Marking[ J]. IEEE Transactions on Parallel and Distribu- ted Systems,2008, 19(10) : 1310-1324.
  • 10陈周国,蒲石,祝世雄.一种通用的互联网追踪溯源技术框架[J].计算机系统应用,2012,21(9):166-170. 被引量:9

二级参考文献124

共引文献33

同被引文献70

  • 1杨文清.浅谈交换机端口镜像在网络运维中的作用[J].计算机产品与流通,2019,0(12):143-143. 被引量:3
  • 2李德全,徐一丁,苏璞睿,冯登国.IP追踪中的自适应包标记[J].电子学报,2004,32(8):1334-1337. 被引量:33
  • 3王慧强,赖积保,朱亮,梁颖.网络态势感知系统研究综述[J].计算机科学,2006,33(10):5-10. 被引量:126
  • 4Burch H, Cheswick B. Tracing Anonymous Packets to their Approximate Source [ C ]. Proceedings of the 14th Conference on Systems Administration, 2000 LISA XIV, New Orleans, I uisiana, USA, 2000.
  • 5Stefan Savage, David Wetherall, Anna Karlin, et al. Network Support for IP Traceback[ J]. IEEFJACM Tran- son Networking, 2001, 9 (5) :226-257.
  • 6Liu Jenshiuh, Zhi Jianlee, Chung Yehching. Dynamic Probabilistic Packet Marking for Efficient IP Traceback [ J ]. Computer Networks, 2007, 51:866-882.
  • 7Song D, Perring A. Advanced and Authenticated Marking Schemes for IP traceback [ C ]. Anchorage, Proceedings of IEEE INFOCOM, Alaska USA, 2001 , 2: 878-886.
  • 8Broder A, Mitzenmacher M. Network Applications of Bloom Filters: A survey [ J ]. Internet Mathematics, 2005,1 (4) :485-509.
  • 9Stoica I, Zhang H. Providing Guaranteed Services Without Per Flow Management. In:Proceedings of the 1999 ACM SIGCOMM Conference,pages 81-94,Boston,MA,Aug. 1999.
  • 10卿昱,杨志聪.基于SOA的栅格安全服务研究[J].信息安全与通信保密,2009,31(2):79-81. 被引量:3

引证文献8

二级引证文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部