期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Discovering Attack Path Oriented-IP Traceback 被引量:1
1
作者 傅建明 Zhu +2 位作者 fuxi PENG Guojun 《High Technology Letters》 EI CAS 2003年第4期56-60,共5页
The technique of IP traceback may effectively block DOS (Denial Of Service) and meet the requirement of the computer forensic, but its accuracy depends upon that condition that each node in the Internet must support I... The technique of IP traceback may effectively block DOS (Denial Of Service) and meet the requirement of the computer forensic, but its accuracy depends upon that condition that each node in the Internet must support IP packet marking or detected agents. So far, this requirement is not satisfied. On the basis of traditional traceroute,this paper investigates the efficiency of discovering path methods from aspects of the size and order of detecting packets, and the length of paths.It points out that the size of padding in probed packets has a slight effect on discovering latency, and the latency with the method of bulk sending receiving is much smaller than one with the traditional traceroute. Moreover, the loss rate of packets with the technique of TTL (Time To Live) which increases monotonously is less than that with the technique of TTL which decreases monotonously. Lastly,OS (Operating System) passive fingerprint is used as heuristic to predict the length of the discovered path so as to reduce disturbance in network traffic. 展开更多
关键词 IP traceback network performance measurement path discovering network Security
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部