[1]闫巧,宁土文.基于矩阵边采样的IP追踪[J].深圳大学学报理工版,2012,29(No.5(377-470)):399-404.[doi:10.3724/SP.J.1249.2012.05399]
 YAN Qiao and NING Tu-wen.IP traceback with matrix edge sampling[J].Journal of Shenzhen University Science and Engineering,2012,29(No.5(377-470)):399-404.[doi:10.3724/SP.J.1249.2012.05399]
点击复制

基于矩阵边采样的IP追踪()
分享到:

《深圳大学学报理工版》[ISSN:1000-2618/CN:44-1401/N]

卷:
第29卷
期数:
2012年No.5(377-470)
页码:
399-404
栏目:
电子与信息科学
出版日期:
2012-09-21

文章信息/Info

Title:
IP traceback with matrix edge sampling
作者:
闫巧1宁土文2
1) 深圳大学计算机与软件学院, 深圳 518060
2) 深圳大学信息工程学院, 深圳 518060
Author(s):
YAN Qiao1 and NING Tu-wen2
1) College of Computer Science and Software Engineering, Shenzhen University, Shenzhen 518060, P.R.China
2) College of Information Engineering, Shenzhen University, Shenzhen 518060, P.R.China
关键词:
数据安全计算机安全IP 追踪概率包标记网络安全拒绝服务攻击分布式拒绝服务攻击压缩边分片采样算法自适应概率分片标记算法
Keywords:
data security computer security Internet protocol traceback probabilistic packet marking network security denial of service attack distributed denial of service attackcompressed edge fragment sampling algorithmadaptive probability fragment marking algorithm
分类号:
TP 393;TP 393.08
DOI:
10.3724/SP.J.1249.2012.05399
文献标志码:
A
摘要:
针对Savage概率包标记压缩边分片采样算法存在的不足,提出改进的压缩分片采样方法,即基于矩阵边采样的IP追踪方法(IP traceback with matrix edge sampling,MES).通过1个二维单位矩阵对相邻路由进行边采样,降低重构算法复杂度;引入8 bit的多路径检验,降低重构路径误报率;采用自适应概率对数据包标记,使重构路径所需数据包数量减少.理论分析和在NS2环境下的实验仿真表明,MES方法的性能在上述3方面都有较大改善.
Abstract:
The Internet protocol(IP) traceback with matrix edge sampling (MES) was proposed based on compressed edge fragment sampling algorithm of probabilistic packet marking (PPM). The MES algorithm reduced the complexity of reconstruction algorithm by applying a two-dimensional matrix to the edge sampling between adjacent routes. Moreover, eight bits hash was employed to check the attack paths in order to reduce false alarm rate of reconstruction paths. The MES reduced the amount of packets to reconstruct the path by using adaptive probability for packet marking. Theoretical analysis and experimental simulation in NS2 environment have shown that the performance of new algorithm is improved on the amount of packets to reconstruct the path. The computational complexity of reconstruction and false alarm rate are also reduced efficiently.

参考文献/References:

[1] Belenky A,Ansari N.On IP traceback[J].IEEE Communications Magazine,2003,41(7):142-153.
[2] Stone R.Center track:an IP overlay network for tracking Dos floods[C]// Proceedings of 2000 USENIX Security Symposium.Denver(USA),2000:199-212.
[3] Burch H,Cheswick B.Tracing anonymous packets to their approximate source[C]// Proceedings of 2000 USENIX LISA Conference.Seattle(USA),2000:319-327.
[4] Sung M,Xu J,Li J,et al.Large-scale IP traceback in high-speed internet:practical techniques and information-theoretic foundation[J].IEEE/ACM Transactions on Networking,2008,16(6):1253-1266.
[5] Savage S,Wetherall D,Karlin A,et al.Network support for IP traceback[J].IEEE/ACM Transactions on Networking,2001,9(3):226-237.
[6] YAN Qiao,XIA Shu-tao,WU Jian-ping.Improved compressed edge fragment sampling algorithm[J].Journal of Xidian University:Nature Science,2006,33(5):824-828.(in Chinese)
闫巧,夏树涛,吴建平.改进的压缩边分段采样算法[J].西安电子科技大学学报:自然科学版,2006,33(5):824-828.
[7] LIU Jenshiuh,LEE Zhi-Jian,CHUNG Yeh-Ching.Dynamic probabilistic packet marking for efficient IP traceback[J].The International Journal of Computer and Telecommunications Networking, 2007,51(3):866-882.
[8] LU Jun-jie,LIU Li.New fragment marking algorithm for IP traceback[J].Computer Engineering and Applications,2010,46(13):4-7.(in Chinese)
吕俊杰,刘丽.一种新的IP追踪的分片标记方法[J].计算机工程与应用,2010,46(1):4-7.
[9] Dean D,Franklin M,Stubblefield A.An algebraic approach to IP traceback[J].ACM Transactions on Information and System Security,2002,5(2):119-137.
[10] Pegah Sattari,Minas Gjoka,Athina Markopoulou.A Network coding approach to IP traceback[C]// IEEE International Symposium on Network Coding(NetCod).Toronto:[s.l.], 2010:1-6.
[11] Snoeren A C,Partridge C,Luis A,et al.Hash-based IP traceback[C]// Proceedings of the ACM SIGCOMM 2001 Conference on Applications, Technologies,Architectures,and Protocols for Computer Communication.New York:ACM,2001:3-14.
[12] Snoeren A C,Partridge C,Luis A,et al.Single-packet IP traceback[J]. IEEE/ACM Transactions on Networking,2002,10(6):721-734.
[13] YAN Qiao, Ning Tu-wen. Implementation of simulation platform for probabilistic packet marking based on NS2[J].Computer Engineering,2011,37(S395):135-138.(in Chinese)
闫巧,宁土文.基于NS2的概率包标记仿真平台的实现[J].计算机工程,2011,37(S395):135-138.

相似文献/References:

[1]朱炜玲,喻建平.物联网RFID系统隐私保护三方认证协议[J].深圳大学学报理工版,2012,29(No.2(095-188)):95.[doi:10.3724/SP.J.1249.2012.02095]
 ZHU Wei-ling and YU Jian-ping.A privacy preserving three-party authentication protocol for RFID systems in the internet of things[J].Journal of Shenzhen University Science and Engineering,2012,29(No.5(377-470)):95.[doi:10.3724/SP.J.1249.2012.02095]
[2]田传俊.频率不相关性及其在单钥密码系统中的应用[J].深圳大学学报理工版,2015,32(1):32.[doi:10.3724/SP.J.1249.2015.01032]
 Tian Chuanjun.Frequency irrelevance and its applications in one-key cryptosystems[J].Journal of Shenzhen University Science and Engineering,2015,32(No.5(377-470)):32.[doi:10.3724/SP.J.1249.2015.01032]
[3]郭文杰,张应辉,郑东.云存储中支持词频和用户喜好的密文模糊检索[J].深圳大学学报理工版,2015,32(5):532.[doi:10.3724/SP.J.1249.2015.05532]
 Guo Wenjie,Zhang Yinghui,et al.Fuzzy search over encrypted data supporting word frequencies and user preferences in cloud storage[J].Journal of Shenzhen University Science and Engineering,2015,32(No.5(377-470)):532.[doi:10.3724/SP.J.1249.2015.05532]

备注/Memo

备注/Memo:
Received:2011-01-05;Revised:2012-06-08
Foundation:National Natural Science Foundation of China (60972011)
Corresponding author:Professor YAN Qiao. E-mail: yanq@szu.edu.cn
Citation:YAN Qiao, NING Tu-wen. IP traceback with matrix edge sampling[J]. Journal of Shenzhen University Science and Engineering, 2012, 29(5): 399-404.(in Chinese)
基金项目:国家自然科学基金资助项目(60972011)
作者简介:闫巧(1972-),女(汉族),广西壮族自治区资源县人,深圳大学教授. E-mail: yanq@szu.edu.cn
引文:闫巧,宁土文.基于矩阵边采样的IP追踪[J]. 深圳大学学报理工版,2012,29(5):399-404.
更新日期/Last Update: 2012-09-26