首页> 外文会议>Parallel and Distributed Computing and Networks >IMPROVED ALGORITHMS TRACING BACK TO ATTACKING SOURCES
【24h】

IMPROVED ALGORITHMS TRACING BACK TO ATTACKING SOURCES

机译:改进的算法可追溯到攻击源

获取原文
获取原文并翻译 | 示例

摘要

This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. We first analyze the limitation of Edge Sampling Algorithm (ESA), then present a new scheme IESA for providing traceback information in IP packets, which marking the packet with a dynamic marking probability to ensure that the victim receives all the marked packets with equal probability. This scheme can reduce greatly the possibility that a marked packet further away from victim is remarked by the router nearer to the victim, hence greatly reduces the number of packets needed to reconstruct the attack path, and therefore greatly reduces the reconstruction time.
机译:本文介绍了一种技术,可用于跟踪Internet中的匿名数据包泛洪攻击并追查其来源。我们首先分析了边缘采样算法(ESA)的局限性,然后提出了一种在IP数据包中提供回溯信息的新方案IESA,该方案以动态标记概率对数据包进行标记,以确保受害者以相等的概率接收所有标记的数据包。该方案可以大大降低离受害者较近的路由器标记的报文被更靠近受害者的路由器标记的可能性,从而大大减少了重建攻击路径所需的报文数量,从而大大减少了重建时间。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号