期刊文献+

浅谈网络攻击源追踪技术的分类及展望 被引量:1

Discussion on the classification and Prospect of network attack source tracing technology
下载PDF
导出
摘要 本文主要将网络攻击源追踪多种不同技术进行了归纳,并分析了各种不同网络攻击源追踪技术的优点和缺点,对网络攻击源追踪的未来研究方向进行了探讨,对网络攻击源追踪技术相关问题提供解决办法。 This paper mainly network attack source tracing a variety of technologies are summarized,and analysis the various network attack source tracing technology and their advantages and disadvantages,the network attack source trace back research directions in the future were also discussed, the tracing network attack source technology related questions provide a solution of.
作者 赵慧博
出处 《电子测试》 2016年第6X期71-72,共2页 Electronic Test
关键词 网络攻击源追踪技术 系统分类 计算机网络安全 IP源追踪 network attack source tracing technology system classification computer network security IP source tracking
  • 相关文献

参考文献1

二级参考文献21

  • 1Dean D, Franklin M, Stubblefield A. An algebraic approach to IP traceback[A]. Proceedings of 2001 Network and Distributed System Security Symposium [C]. California:ACM, 2001.
  • 2Snoeren A C, Partridge C, Sanchez L A, et al. Hash based IP traceback [A]. Proceedings of 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (ACM SIGCOMM) [C].California:ACM, 2001. 3-14.
  • 3Sancbez L A, Milliken W C, Snoeren A C, et al. Hardware support for a hash-based IP traceback [A]. Proceedings ofthe 2nd DARPA Information Survivability Conference and Exposition (DISCEX-Ⅱ) [C]. Anaheim, CA, 2001. 146-152.
  • 4Bellovin S M. ICMP Traceback Messages, Internet Draft[S]. March 2001.
  • 5Mankin A, Massey D, Wu C, et al. On design and evaluation of intention-driven ICMP traceback[A].Proceedings of IEEE 10th International Conference on Computer Communications and Networks (IC3N'2001) [C].Scottsdale, Arizona USA, 2001.
  • 6Staniford-Cben S, Heberlein L T. Holding intruders accountable on the internet [A]. Proceedings of IEEE Symposium on Security and Privacy [C]. Oakland, CA,1995.
  • 7Zhang Y, Paxson V. Detecting stepping stones [A].Proceedings of 9th USENIX Security Symposium [C].Denver, CO, 2000.
  • 8Yoda K, Etoh H. Finding a connection chain for tracing intruders [A]. Proceedings of the 6th European Symposium on Research in Computer Security (LNCS 1985) [C].Toulouse, France, 2000.
  • 9Schnackenberg D, Djabandari K, Sterne D. Infrastructure for intrusion detection and response [A]. Proceedings of DARPA Information Survivability Conference & Exposition(DISCEX '00) [C]. Hilton Head, SC, USA: IEEE, 2000.
  • 10Wang X, Reeves D, Wu S F, et al. Sleepy watermark tracing: An active network-based intrusion response framework [A]. Proceedings of 16th International Conference on Information Security (IFIP/Sec 01)[C].Paris, IKM, 2001.

共引文献14

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部