Font Size: a A A

A New Node Sampling Tracking Algorithm

Posted on:2011-01-29Degree:MasterType:Thesis
Country:ChinaCandidate:W X LuoFull Text:PDF
GTID:2178330338983107Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of network technology, many applications are running in the Internet, subsequently network security become more serious. The traditional defensive measures just defense attack passively, which can not track to the intruder and bring them to justice. Therefore how to track the invaders has become an important means to combat computer crime. That also becomes an important subject of the network security research nowadays.A lot of intrusions tracking technology existed. But most of them are limited in theory, which can not be applied in real network. In this paper, we analyzed many existed tracking technology, and found three major problems. Firstly, it need to modify the existing network protocol. Secondly, it lack of hardware manufacturer support. Thirdly, it lack of network operators support. For these questions, the main works and conclusions of the paper are summarized as follows:1. This paper made detailed analysis and research on the TCP/IP protocol. And it described the functions of every level about TCP/IP model in the network transmission. It analyzed the principle and data packets structure of TCP, UDP and IP protocol. It pointed out the reasonable level and protocol for packet tracing.2. This paper made detailed analysis and research on a variety of packet tracing algorithm. It expounded the idea, the working principle, the advantages and disadvantages of these algorithms.3. This paper analyzed the subjective and objective factors for many packet tracing algorithms that are difficult to apply to the real network. We proposed a new node sampling tracking algorithm based on these factors, described the working principle and flow. From the algorithm convergence time, convergence rate and stability, we made detailed analysis and comparisons, and we described the advantages of the new algorithm.4. Compared to the IPv4, in detailed we analyzed the IPv6 and discussed the principle and method on how to transplant the packet tracing algorithm from IPv4 to IPv6. Finally, we introduced the method how to implement the algorithm in IPv6.The new algorithm has been better promoted than the traditional algorithm, whether in tracking efficiency, convergence time or convergence rate. Considering the practical application, it tried to avoid and reduce transformation for the existing network and equipment, the affected scope, and the dependence on network operators. It improved the implementation. To some extent, it has solved the problem that the old algorithm is limited in theory. The algorithm can apply to real network in practice.
Keywords/Search Tags:Intrusion Traceback, Network Security, Packet Marking
PDF Full Text Request
Related items