2.1 Abstract
2.2 Introduction
2.3 Assumptions
2.4 The Goals of InterTrack
2.5 Requirements
2.6 Overview of InterTrack
2.6.1 Architecture
2.6.2 Behaviors of InterTrack Components
2.7 Reverse AS Path Reconstruction
2.7.1 AS Status against a DDoS Attack
2.7.2 Loop Detection on Forwarding an ITM Trace Request Message
2.7.3 Inconsistency among Tracking Results of each AS
2.7.4 Analysis of Attack Cases against the InterTrack
2.8 Discussion
2.8.1 A Multi-Layer Traceback for Complex Attacks
2.8.2 Privacy Issues
2.8.3 Certification on InterTrack Components
2.9 A Prototype Implementation of InterTrack
2.9.1 Library and InterTrack Components
2.9.2 Sample BTM and DTM Using PAFFI
2.10 Preliminary Evaluation
2.10.1 Expected Round Trip Time of an ITM Trace Request
2.10.2 Preliminary Experiments with Implementation
2.11 Comparison among Other Architectures
2.12 Summary
3.1 はじめに
3.2 IP トレースバック
3.2.1 IP トレースバック方式
3.2.2 IP トレースバック方式における秘匿性
3.3 IP トレースバック方式の相互接続
3.3.1 IP トレースバック相互接続における秘匿性問題
3.3.2 ドメイン間でのパケット秘匿化方式の検討
3.3.3 InterTrack モデルにおける秘匿性
3.4 まとめ
(C) 1998-2016 WIDE Project
|