首页 | 本学科首页   官方微博 | 高级检索  
     检索      

网络入侵追踪研究综述
引用本文:张静,龚俭.网络入侵追踪研究综述[J].计算机科学,2003,30(10):155-159.
作者姓名:张静  龚俭
作者单位:东南大学计算机系江苏省计算机网络技术重点实验室,南京,210096
基金项目:国家自然科学基金 90104031
摘    要:Traceback system is a system for finding the hacker's real location on the network autonomously. It can be divided into two kinds: IP Packet Traceback system, and Connection Traceback system. The goal of IP Packet Traceback system is to traceback the Real Source that send the IP Address Spoofed packet,focused in the method that uses the intermediate routers. The Connection Traceback system traceback the Real Source of Detoured Intrusion,the detoured attack is an attack that is done via several systems. Because of more and more attackers emerging in recent years, the model that can apply to the current Internet should be developed,and Real-time traceback system is needed to actively defense the hacking.

关 键 词:计算机网络  网络安全  入侵检测系统  路由器  网络入侵追踪系统

A Summary of Network Intrusion Traceback
ZHANG Jing GONG Jian.A Summary of Network Intrusion Traceback[J].Computer Science,2003,30(10):155-159.
Authors:ZHANG Jing GONG Jian
Abstract:Traceback system is a system for finding the hacker's real location on the network autonomously. It can be divided into two kinds: IP Packet Traceback system, and Connection Traceback system. The goal of IP Packet Traceback system is to traceback the Real Source that send the IP Address Spoofed packet,focused in the method that uses the intermediate routers. The Connection Traceback system traceback the Real Source of Detoured Intrusion,the detoured attack is an attack that is done via several systems. Because of more and more attackers emerging in recent years, the model that can apply to the current Internet should be developed,and Real-time traceback system is needed to actively defense the hacking.
Keywords:Network intrusion detection  Intrusion traceback  
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机科学》浏览原始摘要信息
点击此处可从《计算机科学》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号