使用包标记技术的IP回溯概述

Swapnil M. Sanap, P. Pawar
{"title":"使用包标记技术的IP回溯概述","authors":"Swapnil M. Sanap, P. Pawar","doi":"10.1109/ICACEA.2015.7164816","DOIUrl":null,"url":null,"abstract":"A network comprises of a plurality of nodes working together to perform similar or different tasks. The network has a huge room for attacks so as to make the network inefficient. The major attacks that are causing huge turbulences to the network and its equivalent resources include Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks. In prior-art there are many techniques that can sense and avoid these attacks. Packet Marking (PM) techniques are the most widely used successful techniques towards avoiding these attacks. However, there are some critical issues with the PM techniques, as these attacks are becoming more complicated due to growing talent in the market. PM technique can be used further to traceback the origin of attacks. In this traceback the major contest is to minimize the amount of packets in successful traceback of these attacks. The packets that are originating from the sources are not enough to traceback the origin. The paper discusses various known PM techniques available for fighting back against the mentioned attacks. Further, the paper also discloses the implementation of these techniques, their advantages, disadvantages, complexity analysis, and the results measured. Future trends including the need for effective and efficient defense mechanism are also discussed.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"sOverview of IP tracebacking using packet marking techniques\",\"authors\":\"Swapnil M. Sanap, P. Pawar\",\"doi\":\"10.1109/ICACEA.2015.7164816\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A network comprises of a plurality of nodes working together to perform similar or different tasks. The network has a huge room for attacks so as to make the network inefficient. The major attacks that are causing huge turbulences to the network and its equivalent resources include Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks. In prior-art there are many techniques that can sense and avoid these attacks. Packet Marking (PM) techniques are the most widely used successful techniques towards avoiding these attacks. However, there are some critical issues with the PM techniques, as these attacks are becoming more complicated due to growing talent in the market. PM technique can be used further to traceback the origin of attacks. In this traceback the major contest is to minimize the amount of packets in successful traceback of these attacks. The packets that are originating from the sources are not enough to traceback the origin. The paper discusses various known PM techniques available for fighting back against the mentioned attacks. Further, the paper also discloses the implementation of these techniques, their advantages, disadvantages, complexity analysis, and the results measured. Future trends including the need for effective and efficient defense mechanism are also discussed.\",\"PeriodicalId\":202893,\"journal\":{\"name\":\"2015 International Conference on Advances in Computer Engineering and Applications\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-03-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Advances in Computer Engineering and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACEA.2015.7164816\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Advances in Computer Engineering and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACEA.2015.7164816","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

网络由一起工作以执行相似或不同任务的多个节点组成。网络具有巨大的攻击空间,使得网络效率低下。目前对网络及其等价资源造成巨大动荡的主要攻击包括DoS (Denial of Service)攻击和DDoS (Distributed Denial of Service)攻击。在现有技术中,有许多技术可以感知和避免这些攻击。包标记(PM)技术是避免这些攻击最广泛使用的成功技术。然而,由于市场上人才的增长,这些攻击变得越来越复杂,因此PM技术存在一些关键问题。PM技术可以进一步用于追踪攻击的来源。在这种回溯中,主要的竞争是尽量减少成功追溯这些攻击的数据包数量。从源端发出的数据包不足以追溯到源端。本文讨论了各种已知的可用于反击上述攻击的PM技术。此外,本文还揭示了这些技术的实现、优缺点、复杂性分析和测量结果。未来的发展趋势,包括需要有效和高效的防御机制。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
sOverview of IP tracebacking using packet marking techniques
A network comprises of a plurality of nodes working together to perform similar or different tasks. The network has a huge room for attacks so as to make the network inefficient. The major attacks that are causing huge turbulences to the network and its equivalent resources include Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks. In prior-art there are many techniques that can sense and avoid these attacks. Packet Marking (PM) techniques are the most widely used successful techniques towards avoiding these attacks. However, there are some critical issues with the PM techniques, as these attacks are becoming more complicated due to growing talent in the market. PM technique can be used further to traceback the origin of attacks. In this traceback the major contest is to minimize the amount of packets in successful traceback of these attacks. The packets that are originating from the sources are not enough to traceback the origin. The paper discusses various known PM techniques available for fighting back against the mentioned attacks. Further, the paper also discloses the implementation of these techniques, their advantages, disadvantages, complexity analysis, and the results measured. Future trends including the need for effective and efficient defense mechanism are also discussed.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信