一种通用的互联网追踪溯源技术框架
作者:

General Traceback Technical Framework for Internet
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [12]
  • |
  • 相似文献 [20]
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    近年来, 应对网络威胁, 学术界提出并发展了网络追踪溯源技术, 产生了多种追踪溯源技术体制; 然而, 多数追踪溯源的技术研究主要集中在具体的溯源技术及算法上, 对网络追踪溯源的技术框架研究较少. 文章从协作网域和非协作网域两个方面分析追踪溯源技术, 提出非协作网域追踪溯源体制, 设计一种通用的互联网追踪溯源技术框架, 将多种有效的追踪溯源技术或方法统一在该框架中, 发挥各种的溯源技术的优势, 实现全球互联网空间的追踪溯源能力, 提高网络安全防护的主动性和有效性.

    Abstract:

    In recent years, to deal with cyber threats, in academic community the traceback is proposed and developed, and a variety of traceback technology is researched. However, the majority of these research focuses on the specific traceability technology and algorithms, and traceback technical framework is lessly done. This articles from two aspects of collaboration domain and non-collaboration domain analysis the traceback technology, to track traceability system proposed non-cooperative domain, design a general traceback technical framework for Internet, which involve various traceback techniques or methods and play all kinds of technology advantages, realize traceback in the global Internet space, improve network security initiative and effectiveness.

    参考文献
    1 彭丹,史志才,陶龙明,马武.IP追踪技术研究.大连大学学报, 2008,29(3):61-66.
    2 Savage S, Wetherall D, Karlin A, Anderson T. Practical Network Support for IP Traceback. Department of Computer Science and Engineering University of Washington Seattle, WA, USA,2000.
    3 Snoeren AC, Partridge C, Sanchez LA, Jones CE, Tchakountio F, Kent ST, Strayer WT. Hash-Based IP Traceback:BBN Technologies10 Moulton Street, Cambridge, MA 02138,2001.
    4 Strayer TW, Jones CE, Tchakountio F, Snoeren AC, Schwartz B, Clements RC, Condell M, Partridge C. Traceback of Single IP Packets Using SPIE, BBN Technologies10 Moulton Street, Cambridge, MA 02138. Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX’03), 2003.
    5 Goodrich MT. Efficient Packet Marking for Large-Scale IP Traceback, Department of Info. & Computer Science, University of California, 2002.
    6 Belenky A, Ansari N. IP Traceback With Deterministic Packet Marking. IEEE Commun. Lett.,2003,7(4):162-164.
    7 Rizvi B, Fermandez-Gaucherand E. Analysis of Adjusted Probabilistic Packet Marking, IEEE, IPOM 2003, 2003,9-13.
    8 Kuznetsov V, Simkin A, Sandstrom H. An evaluation of different IP traceback approaches. Department of Computer Science and Electrical Engineering Lulea University of Technology, SE-971 87 Lulea, Sweden, 2003.
    9 Cohen D, Narayanaswamy K. Attack Attribution in N- on-Cooperative Networks, 2004.
    10 Burch H, Cheswick B. Tracing Anonymous Packets to Their Approximate Source. Proc. of the 14th Conf. Systems Administration, Usenix Assoc.,2000,313-322.
    11 Staniford-Chen S, Heberlein LT. Holding Intruders Accountable on the Internet. http://seclab.cs.ucdavis.edu/ papers/thumb.ieee95.pdf. from proceedings of the 1995 IEEE Symposium on Security and Privacy,1995.
    12 Zhang Y, Paxson V. Detecting Stepping Stones. http://www.usenix.org/publications/library/proceedings/sec2000/full_papers/zhangstepping/zhangstepping.pdf. 9th USENIX Security Symposium, Denver, Colorado. August 14-17, 2000.
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

陈周国,蒲石,祝世雄.一种通用的互联网追踪溯源技术框架.计算机系统应用,2012,21(9):166-170

复制
分享
文章指标
  • 点击次数:1888
  • 下载次数: 4917
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2011-12-26
  • 最后修改日期:2012-02-29
文章二维码
您是第12853422位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京海淀区中关村南四街4号 中科院软件园区 7号楼305房间,邮政编码:100190
电话:010-62661041 传真: Email:csa (a) iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号