首页 | 本学科首页   官方微博 | 高级检索  
     

IP追踪技术
引用本文:杨谦,黄琳,林中. IP追踪技术[J]. 计算机工程与设计, 2007, 28(22): 5367-5370
作者姓名:杨谦  黄琳  林中
作者单位:华北计算技术研究所,北京,100083;华北计算技术研究所,北京,100083;华北计算技术研究所,北京,100083
摘    要:拒绝服务攻击(DOS)严重威胁网络安全.IP追踪技术能够追踪攻击数据包的源头,识别和阻止DoS攻击,是保护网络安全的一项重要技术.通过对IP追踪技术进行总结,回顾IP追踪的起源,按照主动和被动性对其进行分类,分析各个IP追踪方法的基本原理和优缺点,指出了IP追踪技术存在的问题,展望了IP追踪的发展.

关 键 词:IP追踪  前摄追踪  反应追踪  包标记  包日志
文章编号:1000-7024(2007)22-5367-04
收稿时间:2006-12-03
修稿时间:2006-12-03

IP traceback technology
YANG Qian,HUANG Lin,LIN Zhong. IP traceback technology[J]. Computer Engineering and Design, 2007, 28(22): 5367-5370
Authors:YANG Qian  HUANG Lin  LIN Zhong
Abstract:Denial of service(DoS) threatens network security seriously.IP traceback technology can trace the source of the attack packets,identify and prevent from attacking,is an important technology for network security.IP traceback methods is summarized,origin of IP traceback is reviewed.According to passivity and activity,these technologies are compared and classified,the basic principle and advantages and disadvantages of all kinds of methods are analysed,the existing problems is pointed out,development of IP traceback technology is prospected.
Keywords:IP traceback  proactive tracing  reactive tracing  packet marking  packet logging
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号