检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:鲁宁 张俊伟 马建峰 程庆丰 张嘉伟 王尚广[4] LU Ning;ZHANG Jun-Wei;MA Jian-Feng;CHENG Qing-Feng;ZHANG Jia-Wei;WANG Shang-Guang(School of Computer Science and Engineering,Northeastern University,Shenyang 110819,china;School of Cyber Engineering,Xidian University,Xi’an 710071,China;State Key Laboratory of Mathematical Engineering and Advanced Computing(PLA Strategic Support Force Information Engineering University),Zhengzhou 450001,China;State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China)
机构地区:[1]东北大学计算机科学与工程学院,辽宁沈阳110819 [2]西安电子科技大学网络与信息安全学院,陕西西安710071 [3]数学工程与先进计算国家重点实验室(中国人民解放军战略支援部队信息工程大学),河南郑州450001 [4]北京邮电大学网络与交换技术国家重点实验室,北京100876
出 处:《软件学报》2020年第12期3880-3908,共29页Journal of Software
基 金:国家自然科学基金(62072092,62072093,61601107,U1708262,61872449);中国博士后科学基金(2019M653568);河北省自然科学基金(F2015501122,F2020501013);中央高校基本科研业务费(N2023020)。
摘 要:IP协议的“无状态”特征引发了许多网络安全管理问题.为此,人们提出了单包溯源技术.然而,已有方法因激励性能低、无法增量部署、维护成本高等问题,一直未被大规模推广.基于此,提出一种联盟模式下高效单包溯源方法,简称TIST.该方法首先在大规模网络上构建溯源联盟体系结构,通过剪除搭便车自治域来提高部署激励性;然后,通过融合IP流标记和对等过滤技术,设计一种面向溯源联盟的链路指纹建立策略,它能弱化自治域之间的溯源耦合性,实现增量部署;最后,定义一种新的面向网络前缀的计数布鲁姆过滤器,并通过优化其参数,使溯源路由器能够快速识别溯源分组,进而实现链路指纹的选择性建立,降低维护成本.通过理论分析和基于大规模真实和人工互联网拓扑的仿真实验,结果表明:相对于以往方案,TIST在可部署性方面确实有了很大的改善.Single-packet traceback,as a key technology to solve the network security management issues caused by the"statelessness"of IP protocol,has drawn significant attentions in recent years.However,the prior work has not been widely used due to the following disadvantages:1)inability to deploy incrementally;2)lack of deployment incentives,i.e.,none deployer can gain free riding;3)high maintenance costs.This study proposes an efficient single-packet traceback approach based on alliance theory termed as TIST.It firstly establishes the traceability alliance on the large scale networks,so as to remove free-rider ASes and improve the deployment incentives.Secondly,it designs link fingerprint establishment strategy towards traceability alliance through combining IP stream labeling and peer-to-peer filtering technics,which can weaken the traceability coupling between autonomous domains and achieve incremental deployment.Finally,it defines a novel counting Bloom Filter towards network prefixes.By optimizes its parameters,the traceable routers can quickly identify the traceable packets,and achieve the selective establishment of link fingerprints.Extensive mathematical analysis and simulations are performed to evaluate the proposed approach.The results show that the proposed approach significantly out performs the prior approaches in terms of the deploy ability.
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.188.148.202