Discovering Attack Path Oriented-IP Traceback

来源 :High Technology Letters | 被引量 : 0次 | 上传用户:fanfansis
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
The technique of IP traceback may effectively block DOS (Denial Of Service) and meet the requirement of the computer forensic, but its accuracy depends upon that condition that each node in the Internet must support IP packet marking or detected agents. So far, this requirement is not satisfied. On the basis of traditional traceroute,this paper investigates the efficiency of discovering path methods from aspects of the size and order of detecting packets, and the length of paths.It points out that the size of padding in probed packets has a slight effect on discovering latency, and the latency with the method of bulk sending receiving is much smaller than one with the traditional traceroute. Moreover, the loss rate of packets with the technique of TTL (Time To Live) which increases monotonously is less than that with the technique of TTL which decreases monotonously. Lastly,OS (Operating System) passive fingerprint is used as heuristic to predict the length of the discovered path so as to reduce disturbance in network traffic. The technique of IP traceback may effectively block DOS (Denial Of Service) and meet the requirement of the computer forensic, but its accuracy depends upon that condition that that node in the Internet must support IP packet marking or detected agents. So far, this requirement is not satisfied. On the basis of traditional traceroute, this paper investigates the efficiency of discovering path methods from aspects of the size and order of detecting packets, and the length of paths.It points out that the size of padding in probed packets has a slight effect on discovering latency, and the latency with the method of bulk sending receiving is much smaller than one with the traditional traceroute. Moreover, the loss rate of packets with the technique of TTL (Time To Live) which increases monotonously is less than that that with the technique of TTL which decreases monotonously. Lastly, OS (Operating System) passive fingerprint is used as heuristic to predict the length of the discovered path so a s to reduce disturbance in network traffic.
其他文献
地质工程测量在地质工程中是非常重要的工作内容,做好地质工程测量工作意义重大。地质工程测量技术设计对地质工程测量生产有着重要的指导意义,有助于提高地质工程测量质量。本文作者结合自己多年来的从业经验,针对地质工程测量技术中所经常遇到的问题,提出了一些相对比较具体的设计方法,并且还探讨了GPS技术在地质工程测量上的应用。
中山市三乡镇污染源在线监控系统的实施无疑是信息化技术在环境管理上运用的具体表现,本文针对我镇辖区的污染源在线监控系统的设计思路、系统构成及其运行管理做出一些简要
为研究冬小麦对氮、磷、钾、Zn、Mn肥肥料的需求和获取相关施肥参数,伽师县农业技术推广中心设计并开展了冬小麦"3416"肥料效应试验,文章介绍了试验过程,并对结果进行了分析.
近年来,随着我国国民经济的高速发展,我国公路运输业显现出突飞猛进的态势。公路运输呈现车流量大和轴载重的情况,导致沥青砼路面损坏,特别是出现拥包、泛油、车辙、下沉等问
顶进施工方法的特点是在保证铁路交通安全运行的前提下,用设备将铁路外预制的钢筋混凝上箱涵顶入铁路路基内,形成与铁路的立交桥.本文以杭州铁路枢纽扩建Ⅱ标工程打铁港中桥
深水桥梁在地震荷载作用下发生运动时,桥墩水下部分与周围水体(外域)、内部水体(特指空心墩,称为内域)之间的相互作用会导致桥墩受到动水力的作用.利用半解析方法,将桥墩上的
本文结合近几年的施工经验,针对一些较常出现的质量通病与预防措施作如下分析与探讨.
本文对于满足一定条件的一阶线性微分方程,通过举例说明直接利用函数极限的定义证明一阶线性微分方程解的渐近性是一种可行的方法.
随着对软粘土工程性质及其应力一应变关系理解的深化和计算技术的改进,可以对应力与变形机理做出进一步的解释,其沉降计算方法也从最初只考虑单向压缩变形,发展到计及侧向变
秘前建筑物中的主要材料混凝土已越来越受到施工企业的重视,然而建筑行业发展迅速,对于施工中混凝土的使用质量要求不断的提商当前从建筑业的总体发展的趋势来看,混凝土在房