###
DOI:
计算机系统应用英文版:2014,23(1):1-7
←前一篇   |   后一篇→
本文二维码信息
码上扫一扫!
网络攻击追踪溯源层次分析
(电子科技集团公司 第三十研究所, 成都 610041)
Levels Analysis of Network Attack Traceback
(Institute of Electronic Science and Technology Group Co., Ltd. 30, Chengdu 610041, China)
摘要
图/表
参考文献
相似文献
本文已被:浏览 1779次   下载 6118
Received:June 06, 2013    Revised:July 15, 2013
中文摘要: 近年来, 为了有效防御网络攻击, 人们提出了网络攻击追踪溯源技术, 用于追踪定位攻击源头。网络安全系统能在确定攻击源的基础上采取隔离或者其他手段限制网络攻击, 将网络攻击的危害降到最低。由于攻击追踪溯源技术能够为网络防御提供更加准确攻击源、路径等信息, 使得防御方能够实施针对性的防护策略, 其相关技术及研究得到了越来越多的关注与发展。介绍了追踪溯源四层次划分, 重点分析追踪溯源各层次问题, 并就相应技术及追踪过程进行了深入讨论, 以期对追踪溯源有一个全面的描述, 提高对网络攻击追踪溯源的认识。
Abstract:In recent years, to efficiently defend network attack, traceback has been proposed to track dwon the source of attack. With the identifiability of traceback, security measure, such as isolation or others, can be carried out to do less harm in network. Because traceback mechanism is a critical part of the defense against network attack, its related technology and research has achieved more and more attention and development. This article describes the levels of traceback, focusing on analysis of issues of each traceback level and the corresponding technical, and tracking process conducted in-depth discussions on the track in order to give a comprehensive description of traceback and to improve the understanding of cyber attacks attribution.
文章编号:     中图分类号:    文献标志码:
基金项目:
引用文本:
陈周国,蒲石,郝尧,黄宸.网络攻击追踪溯源层次分析.计算机系统应用,2014,23(1):1-7
CHEN Zhou-Guo,PU Shi,HAO Yao,HUANG Chen.Levels Analysis of Network Attack Traceback.COMPUTER SYSTEMS APPLICATIONS,2014,23(1):1-7