IP source address tracing method
An IP address and source address technology, applied in the Internet field, can solve problems such as IP source address traceability, and achieve the effect of eliminating attacks, making small changes, and achieving simplicity.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0045] In order to facilitate the understanding of the present invention, as image 3 As shown, it is a schematic diagram of IP source address traceability according to the embodiment of the present invention, which is mainly divided into three parts: ICMP packet collection, attack division, and traceability graph construction. Concrete implementation manner, process according to the following steps:
[0046] Step 1: Obtain the attack data captured by the network telescope from CAIDA, which is in LZO compressed file format.
[0047] Step 2: Decompress the LZO compressed file to obtain a PCAP format binary data file, and then parse the PCAP file to obtain a text file containing the IP packet header.
[0048] Step 3: Extract all packets targeting a certain victim IP address from the text file obtained in the previous step, and arrange these packets in ascending order according to the timestamp.
[0049] Step 4: From the messages sorted in the previous step, according to the se...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 