Study of IP Traceback Application
碩士 === 樹德科技大學 === 資訊管理研究所 === 97 === Network has been the one the most of useful technology in the modern world. IP (IP Address) is the only identity in the network form TCP/IP Protocol. Nowadays, ISP use Dynamic Host Configuration Protocol for deliver IPv4’s IP address. In another word, every user...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/49255452183496591884 |
id |
ndltd-TW-096STU00396011 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-096STU003960112015-10-13T14:53:17Z http://ndltd.ncl.edu.tw/handle/49255452183496591884 Study of IP Traceback Application 網路攻擊來源追蹤技術應用之研究 Chen-Kuang Lee 李政廣 碩士 樹德科技大學 資訊管理研究所 97 Network has been the one the most of useful technology in the modern world. IP (IP Address) is the only identity in the network form TCP/IP Protocol. Nowadays, ISP use Dynamic Host Configuration Protocol for deliver IPv4’s IP address. In another word, every user may be able to use the same IP address at the different time. Therefore any one can keep their identity hidden. However, this way can grow more and more attack behavior by using dynamic IP address. The attack such as worm, virus and DDoS (Distributed Denial of Service) are familiar in the network environment. Even though, there is a lot of ways to defense the attack behavior, but has less way can find the attack source and block it. Also, IP address isn’t a good clue to identify the attack source. This research brings up a integration way that can identify the source, compared to the old which that only defense the attacker. This research use IP Traceback tools, include Link Tasking, ICMP...ect, to build a system, not only identify the attacker by IP address but also to collect more clues for finding the location of attacker. Chih-Hung Li 李志宏 2009 學位論文 ; thesis 76 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 樹德科技大學 === 資訊管理研究所 === 97 === Network has been the one the most of useful technology in the modern world. IP (IP Address) is the only identity in the network form TCP/IP Protocol. Nowadays, ISP use Dynamic Host Configuration Protocol for deliver IPv4’s IP address. In another word, every user may be able to use the same IP address at the different time. Therefore any one can keep their identity hidden. However, this way can grow more and more attack behavior by using dynamic IP address. The attack such as worm, virus and DDoS (Distributed Denial of Service) are familiar in the network environment. Even though, there is a lot of ways to defense the attack behavior, but has less way can find the attack source and block it. Also, IP address isn’t a good clue to identify the attack source. This research brings up a integration way that can identify the source, compared to the old which that only defense the attacker. This research use IP Traceback tools, include Link Tasking, ICMP...ect, to build a system, not only identify the attacker by IP address but also to collect more clues for finding the location of attacker.
|
author2 |
Chih-Hung Li |
author_facet |
Chih-Hung Li Chen-Kuang Lee 李政廣 |
author |
Chen-Kuang Lee 李政廣 |
spellingShingle |
Chen-Kuang Lee 李政廣 Study of IP Traceback Application |
author_sort |
Chen-Kuang Lee |
title |
Study of IP Traceback Application |
title_short |
Study of IP Traceback Application |
title_full |
Study of IP Traceback Application |
title_fullStr |
Study of IP Traceback Application |
title_full_unstemmed |
Study of IP Traceback Application |
title_sort |
study of ip traceback application |
publishDate |
2009 |
url |
http://ndltd.ncl.edu.tw/handle/49255452183496591884 |
work_keys_str_mv |
AT chenkuanglee studyofiptracebackapplication AT lǐzhèngguǎng studyofiptracebackapplication AT chenkuanglee wǎnglùgōngjīláiyuánzhuīzōngjìshùyīngyòngzhīyánjiū AT lǐzhèngguǎng wǎnglùgōngjīláiyuánzhuīzōngjìshùyīngyòngzhīyánjiū |
_version_ |
1717760507168948224 |