Efficient safety tracing scheme based on flooding attack

A flood attack and scheme technology, applied in the field of network security, can solve the problems of security, performance, and inability to implement algorithms

Inactive Publication Date: 2006-05-24
NANJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

To completely prevent these attacks, we can only change the current network protocol, but this is temporarily impossible
Another solution is to start from the perspective of tracking the location and identity of the attacker. This is also a research hotspot. The purpose is to prevent the attack from the source of the attack and deter the attacker. At present, there are some research results, but the current solutions Either due to performance problems, it cannot be applied, or its own algorithm has security risks, making the application prospect poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient safety tracing scheme based on flooding attack
  • Efficient safety tracing scheme based on flooding attack
  • Efficient safety tracing scheme based on flooding attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] 1. Selection of marking probability:

[0057] Assuming that the length of an attack path is d, and all nodes on the path mark the data packets with probability p, the number of data packets required to reconstruct the path N 1 nd p ( 1 - p ) d - 1 . It can be seen from the formula that when reconstructing an attack path, the number of data packets required is very large. For example, when the length of the attack path is 20 and we select the marking probability as p=0.2, the upper bound of the number of packets required to reconstruct this path exceeds 1000. If the marking information fragments need to be marked in different packets, the requir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The disclosed scheme is a scheme for defending DoS/DdoS attack actively. Tracing attack source, the invention restrains attacks from source. Tracing to source of attack provides evidence for investigating liability of attacker further. Researching on algorithm, the invention strengthens own security from algorithm self, and enhances interference immunity of the algorithm. Probability method for selecting marker is adopted in the scheme instead of original fixing probability method for each route forwarding node so as to optimize capability when attack route is reconstructed.

Description

technical field [0001] The invention is an attack source tracing scheme for flood attacks. It is mainly used to find the source of the attack in the case of a flooding network attack, so as to contain the attack at the source of the attack, and at the same time ensure the security of its own algorithm, which belongs to the field of network security technology. Background technique [0002] Denial of Service (DoS, Denial of Service) and Distributed Denial of Service (DDoS, Distributed Denial of service) are the most common network attacks in today's network attacks, and among them, flooding attacks are the most effective means of attack. Our ultimate tool, favored by some with ulterior motives. In order to fight against attacks, many companies have invested a lot of costs, and have also proposed some effective solutions. The solution mainly focuses on two aspects: one is from the perspective of filtering network attack traffic, and the main solutions include Ingress filteri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24H04L12/721
Inventor 王汝传李金明任勋益
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products