浏览全部资源
扫码关注微信
1. 中国科学院信息工程研究所,北京 100093
2. 国家计算机网络应急技术处理协调中心,北京 100029
[ "林海伦(1987-),女,山东临沂人,博士,中国科学院信息工程研究所助理研究员,主要研究方向为数据挖掘、知识图谱。" ]
[ "李焱(1984-),男,湖北随州人,国家计算机网络应急技术协调中心工程师,主要研究方向为分布式系统和云计算。" ]
[ "王伟平(1975-),男,吉林舒兰人,博士,中国科学院信息工程研究所研究员、博士生导师,主要研究方向为大数据存储与处理。" ]
[ "岳银亮(1982-),男,河南许昌人,博士,中国科学院信息工程研究所副研究员,主要研究方向为大数据存储与智能化处理。" ]
[ "林政(1984-),女,山东青岛人,博士,中国科学院信息工程研究所助理研究员,主要研究方向为自然语言处理、情感分析。" ]
网络出版日期:2016-12,
纸质出版日期:2016-12-25
移动端阅览
林海伦, 李焱, 王伟平, 等. 基于Cookie的网盘资源在线溯源方法[J]. 通信学报, 2016,37(12):77-85.
Hai-lun LIN, Yan LI, Wei-ping WANG, et al. Cookie based online tracing method for cyberlockers resource[J]. Journal on communications, 2016, 37(12): 77-85.
林海伦, 李焱, 王伟平, 等. 基于Cookie的网盘资源在线溯源方法[J]. 通信学报, 2016,37(12):77-85. DOI: 10.11959/j.issn.1000-436x.2016274.
Hai-lun LIN, Yan LI, Wei-ping WANG, et al. Cookie based online tracing method for cyberlockers resource[J]. Journal on communications, 2016, 37(12): 77-85. DOI: 10.11959/j.issn.1000-436x.2016274.
网盘作为一种基于互联网的信息传播载体,其所分享的敏感资源已经在网络流量中占有越来越多的比例,因此,获取网盘资源的分享链接对于网络安全有着重要的意义。提出了一种高效可扩展的基于Cookie的网盘资源溯源方法—CookieTracing。该方法通过在海量的HTTP会话中建立Cookie与HTTP会话的索引表来实现网盘资源和下载网盘资源的跳转链的关联,同时通过累计散列算法加快溯源结果的验证。实验结果表明,所提方法具有较好的性能和可扩展性。
Cyberlockers have recently become an Internet-based agent of information dissemination. In light of the non-negligible fraction accounted by the traffic flows originating from cyberlocks
it is necessary to trace them for net-work security. An efficient and scalable cookie based online cyberlockers resource tracing method was proposed
called CookieTracing. It can achieve an efficient association between cyberlockers resource and its download redirect chain by construction of index table between cookie and HTTP sessions in massive HTTP sessions. Meanwhile
through cumula-tive hash algorithm
it can speed up the validation of tracing results. Experimental results show that this method performs good efficiency and scalability.
MAIER G , FELDMANN A , PAXSON V , et al . On dominant charac-teristics of residential broadband Internet traffic [C ] // 9th ACM SIG-COMM Conference on Internet Measurement. ACM , 2009 : 90 - 102 .
GEHLEN V , FINAMORE A , MELLIA M , et al . Uncovering the big players of the Web [M ] . Springer Berlin Heidelberg , 2012 .
MOBILE TRENDS A . Global mobile broadband traffic report [R/OL ] . Allot Communications, Technical Report , http://www.allot.com/MobileTrendsReport http://www.allot.com/MobileTrendsReport , 2010 .
BERGHEL H . The discipline of Internet forensics [J ] . Communications of the ACM , 2003 , 46 ( 8 ): 15 - 20 .
WATTS S , NEWBY J M , MEWTON L , et al . A clinical audit of changes in suicide ideas with internet treatment for depression [J ] . BMJ open , 2012 , 2 ( 5 ): e001558 .
PANAH A , PANAH A , PANAH O , et al . Challenges of security issues in cloud computing layers [J ] . Rep Opin , 2012 , 4 ( 10 ): 25 - 29 .
GOKCEN Y , FOROUSHANI V A , HEYWOOD A . Can we identify NAT behavior by analyzing traffic flows [C ] // IEEE Security and Pri-vacy Workshops (SPW) . 2014 : 132 - 139 .
LIU T T , YANG W , XU C L , et al . A SNR-based multi-channel multi-cast scheme for popular video in wireless networks [J ] . Journal of Networks , 2013 , 8 ( 3 ): 628 - 635 .
HAYTON S J , JONES D R , LOBO A R , et al . Using entity tags (etags) in a hierarchical HTTP proxy cache to reduce network traffic: U.S. Patent Application 13/360,891 [P ] . 2012 - 1 - 30 .
LEE S , KIM J . Warningbird: a near real-time detection system for suspicious URLs in twitter stream [J ] . IEEE Transactions on Depend-able and Secure Computing , 2013 ( 3 ): 183 - 195 .
JENEFA A , RAVI R . Classifier: a real-time detection system for suspi-cious URLs in Twitter stream [J ] . International Journal , 2014 , 2 ( 2 ).
ZHANG J , SEIFERT C , STOKES J W , et al . Arrow: generating signa-tures to detect drive-by downloads [C ] // 20th International Conference on World Wide Web. ACM , 2011 : 187 - 196 .
GOLDBERG J , WESTERLUND M , ZENG T . A network address translator (NAT) traversal mechanism for media controlled by real-time streaming protocol (RTSP) [J/OL ] . http://tools.ietf.ory/html/draft-ietf-mmusic-rtsp-nat-03 http://tools.ietf.ory/html/draft-ietf-mmusic-rtsp-nat-03 .
MAIER G , SCHNEIDER F , FELDMANN A . NAT usage in residential broadband networks [M ] . Passive and Active Measurement . Springer Berlin Heidelberg , 2011 .
NEASBITT C , PERDISCI R , LI K , et al . Clickminer: towards forensic reconstruction of user-browser interactions from network traces [C ] // The 2014 ACM SIGSAC Conference on Computer and Communications Security , 2014 : 1244 - 1255 .
JINYUAN C . The application of load runner in software performance test [J ] . Computer Development & Applications , 2012 , 5 : 014 .
0
浏览量
1156
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构