【24h】

Tracing Single-Packet Attacks to Their Sources

机译:跟踪单包攻击的来源

获取原文
获取原文并翻译 | 示例

摘要

The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet, attackers often use incorrect, or spoofed, source IP addresses. In this paper, We propose a new method for IP traceback that collects audit trails for traffic within the network, and can trace the origin of a single IP packet delivered by the network in the recent past. We demonstrate that the method is effective. We present both analytic and simulation results showing the method's effectiveness by contrasting with SPIE and Scheme J. We believe that the key contribution of our method is to demonstrate that constructing attack graph is not necessary for tracing.
机译:IP协议的设计使其难以可靠地标识IP数据包的始发者,攻击者经常使用不正确或欺骗的源IP地址。在本文中,我们提出了一种用于IP跟踪的新方法,该方法可以收集网络中流量的审核跟踪,并可以跟踪网络最近传送的单个IP数据包的来源。我们证明该方法是有效的。通过与SPIE和Scheme J进行对比,我们提供了分析和仿真结果,显示了该方法的有效性。我们认为,该方法的关键作用在于证明构造攻击图对于跟踪是不必要的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号