935 resultados para IP traceback


Relevância:

70.00% 70.00%

Publicador:

Resumo:

拒绝服务攻击是一类最难对付的网络安全问题.近来,人们提出了多种对策.其中由Savage等人提出的一类基于概率的包标记方案比较有研究价值.这里先对拒绝服务攻击的对策作一简述,然后分析了几种包标记方案,指出了它们的一些缺陷,并提出了一些改进措施.其中,对基本型概率包标记方案的一个修改使得计算量大大减少.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

拒绝服务(DoS)攻击是目前最难处理的网络难题之一.最近,研究人员针对DoS攻击提出了多种方案,这些方案都各有优缺点.其中,由Savage等人提出的概率包标记方案受到了广泛的重视,也有不少的变种出现.在这一类的标记方案中,路由器以固定的概率选择是否标记一个数据包,这导致受害需要较多的数据包进行攻击路径的重构.本文提出一种自适应的标记策略,经实验验证受害者用较少的数据包即可重构攻击路径,这不仅为受害者及早地响应攻击争取了更多的时间,还限制了攻击者的伪造能力.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

包标记方案是一种针对DoS攻击提出的数据包追踪方案,由于其具有响应时间快、占用资源少的特点,近年来受到了研究者的广泛关注.但由于包标记方案标记过程的随机性,使得受害者进行路径重构时所需收到的数据包数目大大超过了进行重构所必需收到的最小数据包数目,从而导致重构误报率的提高和响应时间的增长.本文提出了一种基于有序标记的IP包追踪方案,该方案通过存储每个目标IP地址的标记状态,对包标记的分片进行有序发送,使得在DoS发生时,受害者重构路径所需收到的标记包的数目大大降低,从而提高了对DoS攻击的响应时间和追踪准确度.该算法的提出进一步提高了包标记方案在实际应用中的可行性.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

DDoS攻击以其高发性、高破坏力和难以防范的特点,近年来成为互联网的主要安全威胁之一.研究者们提出了多种对抗DDoS攻击的方法.:乓中,Savage等人提出的概率包标记方案以其易于实施、消耗资源小等优点,引起人们的重视.然而概率包标记方案存在两个明显缺陷:多攻击路径重构时的高误报率和高计算复杂度.在概率包标记的基础上,提出了一种分块包标记方案,该方案与概率包标记方案相比具有较低的误报率和较低的计算复杂度,因而具有更高的实际应用意义.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since 1986 Vietnam has been engaged in the transition from a centrally-controlled economy to a socialist-oriented market economy (the 'doi moi' renovation). The process for global economic integration has been slow given the magnitude of necessary reforms. Consequently technology entrepreneurs often discount Vietnam as a possible commercialization base which means that it is not realising its economic potential as a hub of technology transfer in the Asia-Pacific region. Three significant factors in the current uncertainty are Vietnam's laws on competition, intellectual property and technology transfer. Another problem is the lack of literature on these laws. This article first discusses the conceptual relationship between competition, intellectual property and technology transfer. Hopefully the article will provide some guidance for the technology entrepreneur considering foreign direct investment (FDI) in Vietnam. The bottom line is that these laws still need further reform to bolster entrepreneurial confidence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

High-rate flooding attacks (aka Distributed Denial of Service or DDoS attacks) continue to constitute a pernicious threat within the Internet domain. In this work we demonstrate how using packet source IP addresses coupled with a change-point analysis of the rate of arrival of new IP addresses may be sufficient to detect the onset of a high-rate flooding attack. Importantly, minimizing the number of features to be examined, directly addresses the issue of scalability of the detection process to higher network speeds. Using a proof of concept implementation we have shown how pre-onset IP addresses can be efficiently represented using a bit vector and used to modify a “white list” filter in a firewall as part of the mitigation strategy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The enforcement of Intellectual Property rights poses one of the greatest current threats to the privacy of individuals online. Recent trends have shown that the balance between privacy and intellectual property enforcement has been shifted in favour of intellectual property owners. This article discusses the ways in which the scope of preliminary discovery and Anton Piller orders have been overly expanded in actions where large amounts of electronic information is available, especially against online intermediaries (service providers and content hosts). The victim in these cases is usually the end user whose privacy has been infringed without a right of reply and sometimes without notice. This article proposes some ways in which the delicate balance can be restored, and considers some safeguards for user privacy. These safeguards include restructuring the threshold tests for discovery, limiting the scope of information disclosed, distinguishing identity discovery from information discovery, and distinguishing information preservation from preliminary discovery.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dáwat, Pamahándí, Tawíd, Ságda, Lampísa, Ibabások, Lapát, Panedlák: for most of us gathered here, these are words that we don’t usually use in our daily lives. Others may consider them as exotic, alien, funny and even backward. However, for indigenous kindred among us, these words denote an intimate identity and deep understanding of the world around them. It constitutes a broader knowledge system, be written or otherwise, which guides them in the management of resources within their ancestral land. This paper will provide a brief theoretical framework of the concepts of indigenous knowledge systems—hereinafter called IKS, and indigenous peoples food security, and hopefully a deeper or continued appreciation in the study of both concepts in general.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

1. In March 2009, the Australian Government, through IP Australia its administrator of Intellectual Property Rights (IPR) acquired by registration or grant, issued two consultation papers for comment by interested stakeholders. 2. The Consultation Papers have invited written submissions directed towards the object of the paper, namely encouraging discussion on certain proposed changes and their impact on business and innovation. 3. I understand the invitation to make written submissions is predominantly in the areas raised by the Consultation Papers and the questions posed. However, I have made a brief reference to several other areas of concern with the current Australian patent law, which in my opinion inhibit innovation and therefore come under the wider agenda of the government to work toward a stronger and more efficient IP rights system. 4. In this regard, the Consultation Papers indicate that if the IPR are less likely to be invalidated and more likely to be enforced, this confidence will reflect in a greater investment in research leading to innovation. 5. This submission relates to the Balance Paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This submission is directed to issues arising in respect of the need to recognise and support access to the internet for all Australian residents and citizens. As such it addresses the following questions only: Questions 2-1: What general principles or criteria should be applied to help determine whether a law that interferes with freedom of speech is justified? Question 2-2: Which Commonwealth laws unjustifiably interfere with freedom of speech, and why are these laws unjustified?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This submission is directed to issues arising in respect of the need to ensure users are able to access copyright works and as such address the following questions only: Question 6-1: What general principles or criteria should be applied to help determine whether a law that interferes with vested property rights is justified? Question 6-2: Which Commonwealth laws unjustifiably interfere with vested property rights, and why are these laws unjustified?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The only effective and scalable way to regulate the actions of people on the internet is through online intermediaries. These are the institutions that facilitate communication: internet service providers, search engines, content hosts, and social networks. Governments, private firms, and civil society organisations are increasingly seeking to influence these intermediaries to take more responsibility to prevent or respond to IP infringements. Around the world, intermediaries are increasingly subject to a variety of obligations to help enforce IP rights, ranging from informal social and governmental pressure, to industry codes and private negotiated agreements, to formal legislative schemes. This paper provides an overview of this emerging shift in regulatory approaches, away from legal liability and towards increased responsibilities for intermediaries. This shift straddles two different potential futures: an optimistic set of more effective, more efficient mechanisms for regulating user behaviour, and a dystopian vision of rule by algorithm and private power, without the legitimising influence of the rule of law.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Chapter 6 of IP46, vested property rights are recognised to include “copyright and other intellectual property rights”. For the purposes of the Inquiry “the ALRC [identified it was to consider] ‘vested property rights’ more in its broad, rhetorical sense, than in its technical sense, in which there are distinct shades of meaning of ‘vested’”. However, the Interim Report states that any ‘vested right’ of users of copyright works “has not been identified yet in law”. It is assumed from this that the ALRC is proposing not to further consider the contracting out of the fair dealing exceptions. In light of its prior stated purpose it is submitted this is not appropriate...