首页> 外文会议>WSEAS International Conferences >IP Trace Back Techniques to Ferret out Denial of Service Attack Source
【24h】

IP Trace Back Techniques to Ferret out Denial of Service Attack Source

机译:IP追溯到拒绝拒绝服务攻击源的拒绝技术

获取原文

摘要

Today's life has been revolutionized by Internet. Future of Internet is even more promising because of emerging technologies like ubiquitous computing, context sensitive, adaptive and reconfigurable applications. Security is the most important issue concerned with Internet. Internet is exposed to threats like system penetration, financial fraud, theft of proprietary information, Denial of Service (DoS)/Distributed Denial of Service (DDoS) Attacks etc. Currently, DoS/DDoS attacks are the most expensive computer crimes. The attacker launching this type of attacks commonly masks his identity using IP spoofing. It is very difficult to identify the sources of a DoS/DDoS attack. IP trace back methods are used to locate the source of packet causing DoS/DDoS. In this paper we have carried out a survey of different existing trace back schemes highlighting their advantages and disadvantages. We also suggest our own hybrid IP traceback technique.
机译:今天的生活已经通过互联网彻底改变了。由于普遍存在的计算,背景敏感,适应性和可重新配置应用,互联网的未来更为希望。安全是互联网最重要的问题。互联网暴露于系统渗透,金融欺诈,专有信息盗窃等威胁,拒绝服务(DOS)/分布式拒绝服务(DDOS)攻击等,DOS / DDOS攻击是最昂贵的计算机犯罪。推出这种类型的攻击的攻击者通常使用IP欺骗来掩盖他的身份。识别DOS / DDOS攻击的来源非常困难。 IP追踪后退方法用于定位导致DOS / DDOS的数据包源。在本文中,我们对不同现有的痕量方案进行了调查,突出了它们的优缺点。我们还建议我们自己的混合IP回溯技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号