首页 | 本学科首页   官方微博 | 高级检索  
     

可控网络攻击源追踪技术研究
引用本文:李小勇,刘东喜,谷大武,白英彩.可控网络攻击源追踪技术研究[J].计算机研究与发展,2003,40(6):808-812.
作者姓名:李小勇  刘东喜  谷大武  白英彩
作者单位:上海交通大学计算机科学与工程系,上海,200030
基金项目:国家“八六三”高技术研究发展计划项目基金 ( 2 0 0 1AA14 4 0 60 2 )
摘    要:提出一种新的基于网络入侵检测的攻击源追踪方法.给出了系统模型,深入分析了攻击链路集合构造和攻击链路上下游关系的确定方法,在此基础上提出攻击路径构造算法.实验结果表明,该系统能够在可控网络环境下实时、准确地对攻击源进行追踪.和已有方法相比,新的方法在实用性、追踪的准确性、系统的可扩展性等方面有明显提高.

关 键 词:攻击源追踪  入侵检测  网络安全

Research on Intrusion Traceback in Controlled Network Environment
LI Xiao-Yong,LIU Dong-Xi,GU Da-Wu,and BAI Ying-Cai.Research on Intrusion Traceback in Controlled Network Environment[J].Journal of Computer Research and Development,2003,40(6):808-812.
Authors:LI Xiao-Yong  LIU Dong-Xi  GU Da-Wu  and BAI Ying-Cai
Abstract:In this paper, an intrusion traceback mechanism based on network intrusion detection is proposed. A system model is given and the scheme of constructing an attack link set and ordering the attack links is discussed in detail, and then an algorithm of constructing attack path is put forword. Experiments show that the system can trace back and locate the attack source accurately and real-timely under a controlled environment. Compared with the other existing systems, this system has remarkable improvement of availability, accuracy and scalability.
Keywords:intrusion traceback  intrusion detection  network security  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号