Page 241 - 《软件学报》2020年第12期
P. 241
鲁宁 等:联盟模式下高效单包溯源方法研究 3907
因此,我们希望在今后:
1) 以当前本文研究为基础构建真实网络环境下的实验平台,补充 TIST 对路由器分组转发性能的影响;
2) 在订阅付费模式上,进一步设计一种面向服务的单包溯源方法,使得每个服务提供域能够依据溯源成
本逐次向服务使用者收取费用,保证收支平衡;
3) 设计一种面向溯源系统的访问控制策略,阻止恶意用户随意发起溯源服务请求,增强系统鲁棒性.
References:
[1] Lu N, Hu WH. SAFE: A scalable filter-based packet filtering scheme. China Communications, 2016,13(2):163−177. [doi: 10.1109/
CC.2016.7405734]
[2] Lu N, Wang YL, Su S, Yang FC. Filtering location optimization for the reactive packet filtering. Security and Communication
Networks, 2014,7(7):1150−1164. [doi: 10.1002/sec.848]
[3] Lu N, Wang Y, Shi W. Filtering location optimization for defending against large-scale BDoS attacks. Chinese Journal of
Electronics, 2017,26(2):435−444. [doi: 10.1049/cje.2017.01.016]
[4] Cheng L, Divakaran DM, Ang WK. FACT: A framework for authentication in cloud-based IP traceback. IEEE Trans. on
Information Forensics & Security, 2017,2017(99):604−616. [doi: 10.1109/TIFS.2016.2624741]
[5] Nur AY, Tozal ME. Record route IP traceback: Combating DoS attacks and the variants. Computers & Security, 2018,72:13−25.
[doi: 10.1016/j.cose.2017.08.012]
[6] Aghaei-Foroushani V, Zincir-Heywood AN. IP traceback through (authenticated) deterministic flow marking: An empirical
evaluation. Eurasip Journal on Information Security, 2013,2013(1):1−24. [doi: 10.1186/1687-417X-2013-5]
[7] Yu S, Zhou W, Guo S, et al. A feasible IP traceback framework through dynamic deterministic packet marking. IEEE Trans. on
Computers, 2016,65(5):1418−1427. [doi: 10.1109/TC.2015.2439287]
[8] Gong C, Sarac K. A more practical approach for single-packet IP traceback using packet logging and marking. IEEE Trans. on
Parallel and Distributed Systems, 2008,19(10):1310−1324. [doi: 10.1109/ TPDS.2007.70817]
[9] Vijayalakshmi M, Shalinie SM, Ming-Hour Y. HPSIPT: A high-precision single-packet IP traceback scheme. Computer Networks,
2018,143:275−288. [doi: 10.1016/j.comnet.2018.07.013]
[10] Lu N, Wang YL, Su S, Yang FC. A novel path-based approach for single-packet IP traceback. Security and Communication
Networks, 2013,7(2):309−321. [doi: 10.1002/sec.741]
[11] Lu N, Wang SG, Li F, Shi WB, Yang FC. An efficient and precise approach for single-packet traceback. Ruan Jian Xue Bao/
Journal of Software, 2017,28(10):2737−2756 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/28/2737.htm
[doi: 10.3724/SP.J.1016.2015. 00500]
[12] Lu N, Wang SG, Li F, Shi WB, Yang FC. A dynamically scalable and efficient approach for single-packet IP traceback. Ruan Jian
Xue Bao/Journal of Software, 2018,29(11):3554−3574 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/5330.
htm [doi: 10.13328/j.cnki.jos.005330]
[13] Lu N, Li F, Wang SG, Shi WB, Yang FC. A hierarchical anti-spoofing alliance construction approach based on MEF. Ruan Jian
Xue Bao/Journal of Software, 2017 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/5517.htm [doi: 10.13328/
j.cnki.jos.005517]
[14] Liu BY, Bi J, Athanasios VV. Toward incentivizing anti-spoofing deployment. IEEE Trans. on Information Forensics and Security,
2014,9(3):436−450. [doi: 10.1109/TIFS.2013.2296437]
[15] Soldo F, Argyraki K, Markopoulou A. Optimal source-based filtering of malicious traffic. IEEE/ACM Trans. on Networking, 2012,
20(2):381−395. [doi: 10.1109/TNET.2011.2161615]
[16] Geravand S, Ahmadi M. Bloom filter applications in network security: A state-of-the-art survey. Computer Networks, 2013,57(18):
4047−4064. [doi: 10.1016/j.comnet.2013.09.003]
[17] Cidr Report. 2013. URL: http://www.cidr-report.org/as2.0/
[18] Kamaldeep, Malik M, Dutta M. Implementation of single-packet hybrid IP traceback for IPv4 and IPv6 networks. IET Information
Security, 2018,12(1):1−6. [doi: 10.1049/iet-ifs.2015.0483]