-
- Alex C. Snoeren
- BBN Technologies, 10 Moulton Street, Cambridge, MA and MIT Laboratory for Computer Science
-
- Craig Partridge
- BBN Technologies, 10 Moulton Street, Cambridge, MA
-
- Luis A. Sanchez
- BBN Technologies, 10 Moulton Street, Cambridge, MA
-
- Christine E. Jones
- BBN Technologies, 10 Moulton Street, Cambridge, MA
-
- Fabrice Tchakountio
- BBN Technologies, 10 Moulton Street, Cambridge, MA
-
- Stephen T. Kent
- BBN Technologies, 10 Moulton Street, Cambridge, MA
-
- W. Timothy Strayer
- BBN Technologies, 10 Moulton Street, Cambridge, MA
抄録
<jats:p> The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet. Even in the absence of any deliberate attempt to disguise a packet's origin, wide-spread packet forwarding techniques such as NAT and encapsulation may obscure the packet's true source. Techniques have been developed to determine the source of large packet flows, but, to date, no system has been presented to track individual packets in an efficient, scalable fashion.We present a hash-based technique for IP traceback that generates audit trails for traffic within the network, and can trace the origin of a <jats:italic>single</jats:italic> IP packet delivered by the network in the recent past. We demonstrate that the system is effective, space-efficient (requiring approximately 0.5% of the link capacity per unit time in storage), and implementable in current or next-generation routing hardware. We present both analytic and simulation results showing the system's effectiveness. </jats:p>
収録刊行物
-
- ACM SIGCOMM Computer Communication Review
-
ACM SIGCOMM Computer Communication Review 31 (4), 3-14, 2001-08-27
Association for Computing Machinery (ACM)
- Tweet
詳細情報 詳細情報について
-
- CRID
- 1362262945661211776
-
- NII論文ID
- 80012847073
-
- ISSN
- 01464833
-
- データソース種別
-
- Crossref
- CiNii Articles