A deployable IP spoofing defence system

作者: Lei Wang

DOI:

关键词:

摘要: It is certain that IP spoofing remains a serious issue at present over the Internet. Our work in this thesis to offer an authentic source identifier which may be employed by network for packets. In thesis, we provide original model together with examination of Spoofing Defence System (SDS) Autonomous (AS) level designed filtering spoofed An Inter-Domain Routing Validator (IRV) handles secret keys and exchange among different ASes via secure communication channel. As it system, SDS definitely effective easily cooperatively other defence systems.

参考文章(61)
E. Chen, Route Refresh Capability for BGP-4 RFC. ,vol. 2918, pp. 1- 4 ,(2000)
Charles Lynn, Karen Seo, Stephen T. Kent, Joanne Mikkelson, Secure Border Gateway Protocol (S-BGP) — Real World Performance and Deployment Issues network and distributed system security symposium. ,(2000)
Greg Taleck, Ambiguity Resolution via Passive OS Fingerprinting recent advances in intrusion detection. pp. 192- 206 ,(2003) , 10.1007/978-3-540-45248-5_11
Steven Bauer, Robert Beverly, The spoofer project: inferring the extent of source address filtering on the internet conference on steps to reducing unwanted traffic on internet. pp. 8- 8 ,(2005)
Arjen K. Lenstra, Eric R. Verheul, Selecting Cryptographic Key Sizes public key cryptography. pp. 446- 465 ,(2000) , 10.1007/978-3-540-46588-1_30
A. M. Odlyzko, Discrete logarithms in finite fields and their cryptographic significance theory and application of cryptographic techniques. pp. 224- 314 ,(1985) , 10.1007/3-540-39757-4_20
S.M. Bellovin, A look back at "security problems in the TCP/IP protocol suite annual computer security applications conference. pp. 229- 249 ,(2004) , 10.1109/CSAC.2004.3
Vern Paxson, Christian Kreibich, Mark Handley, Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics usenix security symposium. pp. 9- 9 ,(2001)
Shai Halevi, Hugo Krawczyk, MMH: Software Message Authentication in the Gbit/Second Rates fast software encryption. pp. 172- 189 ,(1997) , 10.1007/BFB0052345
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway, UMAC: Fast and Secure Message Authentication international cryptology conference. pp. 216- 233 ,(1999) , 10.1007/3-540-48405-1_14