
浏览全部资源
扫码关注微信
1. 中国科学院信息工程研究所,北京 100093
2. 国家计算机网络应急技术处理协调中心,北京 100029
Online First:2016-12,
Published:25 December 2016
移动端阅览
Hai-lun LIN, Yan LI, Wei-ping WANG, et al. Cookie based online tracing method for cyberlockers resource[J]. Journal on Communications, 2016, 37(12): 77-85.
Hai-lun LIN, Yan LI, Wei-ping WANG, et al. Cookie based online tracing method for cyberlockers resource[J]. Journal on Communications, 2016, 37(12): 77-85. DOI: 10.11959/j.issn.1000-436x.2016274.
网盘作为一种基于互联网的信息传播载体,其所分享的敏感资源已经在网络流量中占有越来越多的比例,因此,获取网盘资源的分享链接对于网络安全有着重要的意义。提出了一种高效可扩展的基于Cookie的网盘资源溯源方法—CookieTracing。该方法通过在海量的HTTP会话中建立Cookie与HTTP会话的索引表来实现网盘资源和下载网盘资源的跳转链的关联,同时通过累计散列算法加快溯源结果的验证。实验结果表明,所提方法具有较好的性能和可扩展性。
Cyberlockers have recently become an Internet-based agent of information dissemination. In light of the non-negligible fraction accounted by the traffic flows originating from cyberlocks
it is necessary to trace them for net-work security. An efficient and scalable cookie based online cyberlockers resource tracing method was proposed
called CookieTracing. It can achieve an efficient association between cyberlockers resource and its download redirect chain by construction of index table between cookie and HTTP sessions in massive HTTP sessions. Meanwhile
through cumula-tive hash algorithm
it can speed up the validation of tracing results. Experimental results show that this method performs good efficiency and scalability.
MAIER G , FELDMANN A , PAXSON V , et al . On dominant charac-teristics of residential broadband Internet traffic [C ] // 9th ACM SIG-COMM Conference on Internet Measurement. ACM , 2009 : 90 - 102 .
GEHLEN V , FINAMORE A , MELLIA M , et al . Uncovering the big players of the Web [M ] . Springer Berlin Heidelberg , 2012 .
MOBILE TRENDS A . Global mobile broadband traffic report [R/OL ] . Allot Communications, Technical Report , http://www.allot.com/MobileTrendsReport http://www.allot.com/MobileTrendsReport , 2010 .
BERGHEL H . The discipline of Internet forensics [J ] . Communications of the ACM , 2003 , 46 ( 8 ): 15 - 20 .
WATTS S , NEWBY J M , MEWTON L , et al . A clinical audit of changes in suicide ideas with internet treatment for depression [J ] . BMJ open , 2012 , 2 ( 5 ): e001558 .
PANAH A , PANAH A , PANAH O , et al . Challenges of security issues in cloud computing layers [J ] . Rep Opin , 2012 , 4 ( 10 ): 25 - 29 .
GOKCEN Y , FOROUSHANI V A , HEYWOOD A . Can we identify NAT behavior by analyzing traffic flows [C ] // IEEE Security and Pri-vacy Workshops (SPW) . 2014 : 132 - 139 .
LIU T T , YANG W , XU C L , et al . A SNR-based multi-channel multi-cast scheme for popular video in wireless networks [J ] . Journal of Networks , 2013 , 8 ( 3 ): 628 - 635 .
HAYTON S J , JONES D R , LOBO A R , et al . Using entity tags (etags) in a hierarchical HTTP proxy cache to reduce network traffic: U.S. Patent Application 13/360,891 [P ] . 2012 - 1 - 30 .
LEE S , KIM J . Warningbird: a near real-time detection system for suspicious URLs in twitter stream [J ] . IEEE Transactions on Depend-able and Secure Computing , 2013 ( 3 ): 183 - 195 .
JENEFA A , RAVI R . Classifier: a real-time detection system for suspi-cious URLs in Twitter stream [J ] . International Journal , 2014 , 2 ( 2 ).
ZHANG J , SEIFERT C , STOKES J W , et al . Arrow: generating signa-tures to detect drive-by downloads [C ] // 20th International Conference on World Wide Web. ACM , 2011 : 187 - 196 .
GOLDBERG J , WESTERLUND M , ZENG T . A network address translator (NAT) traversal mechanism for media controlled by real-time streaming protocol (RTSP) [J/OL ] . http://tools.ietf.ory/html/draft-ietf-mmusic-rtsp-nat-03 http://tools.ietf.ory/html/draft-ietf-mmusic-rtsp-nat-03 .
MAIER G , SCHNEIDER F , FELDMANN A . NAT usage in residential broadband networks [M ] . Passive and Active Measurement . Springer Berlin Heidelberg , 2011 .
NEASBITT C , PERDISCI R , LI K , et al . Clickminer: towards forensic reconstruction of user-browser interactions from network traces [C ] // The 2014 ACM SIGSAC Conference on Computer and Communications Security , 2014 : 1244 - 1255 .
JINYUAN C . The application of load runner in software performance test [J ] . Computer Development & Applications , 2012 , 5 : 014 .
0
Views
2310
下载量
0
CSCD
Publicity Resources
Related Articles
Related Author
Related Institution
京公网安备11010802024621