Page 241 - 《软件学报》2020年第12期
P. 241

鲁宁  等:联盟模式下高效单包溯源方法研究                                                            3907


         因此,我们希望在今后:
             1)   以当前本文研究为基础构建真实网络环境下的实验平台,补充 TIST 对路由器分组转发性能的影响;
             2)   在订阅付费模式上,进一步设计一种面向服务的单包溯源方法,使得每个服务提供域能够依据溯源成
                 本逐次向服务使用者收取费用,保证收支平衡;
             3)   设计一种面向溯源系统的访问控制策略,阻止恶意用户随意发起溯源服务请求,增强系统鲁棒性.

         References:
          [1]    Lu N, Hu WH. SAFE: A scalable filter-based packet filtering scheme. China Communications, 2016,13(2):163−177. [doi: 10.1109/
             CC.2016.7405734]
          [2]    Lu  N,  Wang  YL,  Su S, Yang FC. Filtering location optimization  for the reactive packet filtering. Security  and Communication
             Networks, 2014,7(7):1150−1164. [doi: 10.1002/sec.848]
          [3]    Lu N, Wang  Y, Shi W.  Filtering location  optimization  for  defending against  large-scale BDoS attacks. Chinese  Journal  of
             Electronics, 2017,26(2):435−444. [doi: 10.1049/cje.2017.01.016]
          [4]    Cheng L, Divakaran DM, Ang WK.  FACT: A framework  for authentication  in cloud-based  IP  traceback.  IEEE  Trans.  on
             Information Forensics & Security, 2017,2017(99):604−616. [doi: 10.1109/TIFS.2016.2624741]
          [5]    Nur AY, Tozal ME. Record route IP traceback: Combating DoS attacks and the variants. Computers & Security, 2018,72:13−25.
             [doi: 10.1016/j.cose.2017.08.012]
          [6]    Aghaei-Foroushani V,  Zincir-Heywood AN. IP traceback  through (authenticated) deterministic flow  marking: An  empirical
             evaluation. Eurasip Journal on Information Security, 2013,2013(1):1−24. [doi: 10.1186/1687-417X-2013-5]
          [7]    Yu S, Zhou W, Guo S, et al. A feasible IP traceback framework through dynamic deterministic packet marking. IEEE Trans. on
             Computers, 2016,65(5):1418−1427. [doi: 10.1109/TC.2015.2439287]
          [8]    Gong C, Sarac K. A more practical approach for single-packet IP traceback using packet logging and marking. IEEE Trans. on
             Parallel and Distributed Systems, 2008,19(10):1310−1324. [doi: 10.1109/ TPDS.2007.70817]
          [9]    Vijayalakshmi M, Shalinie SM, Ming-Hour Y. HPSIPT: A high-precision single-packet IP traceback scheme. Computer Networks,
             2018,143:275−288. [doi: 10.1016/j.comnet.2018.07.013]
         [10]    Lu N, Wang YL, Su  S, Yang  FC. A  novel  path-based approach  for single-packet  IP  traceback.  Security and Communication
             Networks, 2013,7(2):309−321. [doi: 10.1002/sec.741]
         [11]    Lu N, Wang  SG, Li  F,  Shi  WB, Yang  FC.  An efficient and  precise approach  for single-packet  traceback. Ruan  Jian Xue Bao/
             Journal of Software, 2017,28(10):2737−2756  (in Chinese  with English abstract).  http://www.jos.org.cn/1000-9825/28/2737.htm
             [doi: 10.3724/SP.J.1016.2015. 00500]
         [12]    Lu N, Wang SG, Li F, Shi WB, Yang FC. A dynamically scalable and efficient approach for single-packet IP traceback. Ruan Jian
             Xue Bao/Journal of Software, 2018,29(11):3554−3574 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/5330.
             htm [doi: 10.13328/j.cnki.jos.005330]
         [13]    Lu N, Li F, Wang SG, Shi WB, Yang FC. A hierarchical anti-spoofing alliance construction approach based on MEF. Ruan Jian
             Xue Bao/Journal of Software, 2017 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/5517.htm [doi: 10.13328/
             j.cnki.jos.005517]
         [14]    Liu BY, Bi J, Athanasios VV. Toward incentivizing anti-spoofing deployment. IEEE Trans. on Information Forensics and Security,
             2014,9(3):436−450. [doi: 10.1109/TIFS.2013.2296437]
         [15]    Soldo F, Argyraki K, Markopoulou A. Optimal source-based filtering of malicious traffic. IEEE/ACM Trans. on Networking, 2012,
             20(2):381−395. [doi: 10.1109/TNET.2011.2161615]
         [16]    Geravand S, Ahmadi M. Bloom filter applications in network security: A state-of-the-art survey. Computer Networks, 2013,57(18):
             4047−4064. [doi: 10.1016/j.comnet.2013.09.003]
         [17]    Cidr Report. 2013. URL: http://www.cidr-report.org/as2.0/
         [18]    Kamaldeep, Malik M, Dutta M. Implementation of single-packet hybrid IP traceback for IPv4 and IPv6 networks. IET Information
             Security, 2018,12(1):1−6. [doi: 10.1049/iet-ifs.2015.0483]
   236   237   238   239   240   241   242   243   244   245   246