透過您的圖書館登入
IP:3.138.102.178
  • 學位論文

植基於EMD技術之IP位址追蹤探討

IP Traceback Method Base on Exploiting Modification Direction

指導教授 : 郭文中
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


由於 TCP/IP的固有缺陷,會使得攻擊者能夠利用假冒封包的來源來進行攻擊。為了防止網路受到攻擊,因此需要建立IP 追蹤技術來找出攻擊者的真實來源位置。而本論文所提的方法是以Gong 等人的方法為基礎,並結合混合封包標記及封包記錄的方式,來改善每個封包經過路由器都必須做記錄的缺點,同時藉由額外記錄封包所經過的路由器資訊,將建構攻擊路徑所產生的錯誤節點數目大量的降低。經過實驗模擬結果,發現本論文所提的方法是一個有較低儲存花費及較少錯誤攻擊節點的單一封包IP 追蹤方法。

並列摘要


Because of THE TCP/IP's defects, the attackers can counterfeits the source of the packet to do attacks. In order to prevent the attacks, we have to establish THE IP TRACKING TECHNIQUES to find out the real source of the attackers. Therefore, the way we do in the thesis is to use Gong's Ways as the foundation and simultaneously combine the packet marketing with the packet logging to improve the drawbacks of that every packets that pass through the router should be recorded. Meanwhile, we can reduce the drawbacks that are resulted from constructing. The Attack Way by recording the information those pass through the router. We found that the way we do in the thesis is the single-packet IP tracking way which has lower wrong attack-nodes and storage expenditures.

並列關鍵字

IP traceback packet marking packet logging

參考文獻


[21] 曾釋賢、賴溪松,2008,“建置新一代網路安全測試平台Testbed@TWISC:整體環境規劃與實現。”,國立成功大學電機工程研究所碩士論文。
[18] Wen-Chung Kuo, Jiin-Chiou Cheng and Chun-Cheng Wang, 2010, “Data Hiding Method With High Embedding Capacity Character,” International Journal of Image Processing (IJIP), Vol.3, No.6, pp.310-317, 2010.
[1] Akyuz, T., Sogukpinar, I., 2009,” Packet Marking with Distance Based Probabilities for IP Traceback” , Networks and Communications, 433 – 438
[11] Chao Gong; Sarac, K., 2005 “IP Traceback based on packet marking and logging” Communications, 2005. ICC 2005. 2005 IEEE International Conference, Vol. 2, pp.1043 – 1047, 6-20 May. 2005.
[13] Kumar, P.A.R.; Selvakumar, S., 2009, “Distributed Denial-of-Service (DDoS) Threat in Collaborative Environment - A Survey on DDoS Attack Tools and Traceback Mechanisms”, Advance Computing Conference, 2009. IACC 2009. IEEE International, pp.1275 – 1280, 6-7 March 2009.

延伸閱讀