首页 | 本学科首页   官方微博 | 高级检索  
     检索      

Discovering Attack Path Oriented-IP Traceback
作者姓名:傅建明  Zhu Fuxi  PENG Guojun
作者单位:CollegeofComputerScience,WuhanUniversity,Wuhan430072,P.R.China
基金项目:SupportedbytheNationalNaturalScienceFoundationofChinaandHBNSF
摘    要:The technique of IP traceback may effectively block DOS (Denial Of Service) and meet the requirement of the computer forensic, but its accuracy depends upon that condition that each node in the Internet must support IP packet marking or detected agents. So far, this requirement is not satisfied. On the basis of traditional traeeroute, this paper investigates the efficiency of diseovering path methods from aspects of the size and order of detecting packets, and the length of paths. It points out that the size of padding in probed packets has a slight effect on discovering latency, and the latency with the method of bulk sending-receiving is much smaller than one with the traditional tracemute. Moreover, the loss rate of packets with the technique of TTL (Time To Live) which increases monotonously is less than that with the technique of TTL which decreases monotonously. Lastly,OS (Operating System) passive fingerprint is used as heuristic to predict the length of the discovered path so as to reduce disturbance in network traffic.

关 键 词:IP技术  互联网  操作系统  TTL技术  TCP/IP协议

Discovering Attack Path Oriented-IP Traceback
Zhu Fuxi,PENG Guojun.Discovering Attack Path Oriented-IP Traceback[J].High Technology Letters,2003,9(4):56-60.
Authors:Zhu Fuxi  PENG Guojun
Abstract:The technique of IP traceback may effectively block DOS (Denial Of Service) and meet the requirement of the computer forensic, but its accuracy depends upon that condition that each node in the Internet must support IP packet marking or detected agents. So far, this requirement is not satisfied. On the basis of traditional traceroute,this paper investigates the efficiency of discovering path methods from aspects of the size and order of detecting packets, and the length of paths.It points out that the size of padding in probed packets has a slight effect on discovering latency, and the latency with the method of bulk sending receiving is much smaller than one with the traditional traceroute. Moreover, the loss rate of packets with the technique of TTL (Time To Live) which increases monotonously is less than that with the technique of TTL which decreases monotonously. Lastly,OS (Operating System) passive fingerprint is used as heuristic to predict the length of the discovered path so as to reduce disturbance in network traffic.
Keywords:IP traceback  network performance measurement  path discovering  network Security
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号