期刊文献+

检测使用Web反射器的攻击

Detecting Attacks via Web Reflectors
下载PDF
导出
摘要 攻击者在大规模DDoS网络攻击中使用反射器向受害者发送洪水包,Web服务器被攻击者利用为TCP反射器不仅加剧了网络攻击的程度,也消耗了正常Web服务资源。分析了Web反射器所在网络的入出口流量特点,以及攻击者利用Web反射器发起攻击时的数据包特性,利用流入和流出反射器网络TCP数据包的特性,通过对网络流量的异常统计检测和实时在线分析来检测Web反射器。模拟实验表明,可以检测出利用Web服务器进行的大规模DRDoS攻击。 Attackers can impose reflectors to flood victim machines in large scale DDoS attacks.The consequence that Web servers have been used as reflectors can not only aggravate the extent of the network attacks but consume the normal resources of Web servers,The characteristics of the ingress and exgress traffic of the Web servers reflectors' network,and that of attacking packets when DDoS attacks imposed Web servers reflectors is analyzed,According to the statistics on TCP packets travelling through the reflectors' network,we can detect Web servers reflectors by detecing traffic anomaly and on-line analyzing in real-time.Our experiments indicate that large scale DDoS attacks via Web servers reflectors imposed can be detected.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第22期143-146,共4页 Computer Engineering and Applications
基金 国家自然科学基金项目(编号:90204014)
关键词 DDOS 反射器 WEB IP反向追踪 DDoS, reflector, Web, IP traceback
  • 相关文献

参考文献12

  • 1David Moore, Geoffrey Voelker, Stefan Savage. Inferring Internet Denial-of-Service Activity[C].In:10th USENIX Security Symposium,Washington, D C,USA,2001-08.
  • 2Steve Gibson. Gibson Research Corporation. Distributed Reflection Denial of Service.http:∥grc.com/dos/drdos.htm,2002.
  • 3S C Lee,C Shields.Tracing the Source of Network Attack:A Technical,Legal and Societal Problem[C].In:Proceedings of the 2001 IEEE Workshop on Information Assurance and Security,2001-06.
  • 4V Paxson. An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks[J].Computer Communication Review,2001 ;31(3).
  • 5Steven M Bellovin ed. ICMP Traceback Messages[S].Internet Draft:draft-bellovinitrace-00txt, 2000-03.
  • 6Stefan Savage,David Wetherall,Anna Karlin et al.Network Support for IP Traceback [ J ].ACM/IEEE Transactions on Networking, 2001; 9 (3) :226~237.
  • 7Alex C Snoeren,Craig Partridge,Luis A Sanchez et al.Hash-Based IP Traceback[C].In:Proceedings of the ACM SIGCOMM 2001 Conference on Applications,Technologies,Architectures, and Protocols for Computer Communication, 2001-08.
  • 8NLANR Trace Archive.http:∥pma.nlanr. net/Traces/long/.
  • 9Haining Wang,Danlu Zhang,Kang G Shin. Detecting SYN Flooding Attacks[C].In:Proceedings of IEEE INFOCOM'2002,New York City,NY, 2002.
  • 10Thomer M Gil,Massimiliano Poletto. MULTOPS:a data-structure for bandwidth attack detection[C].In:the Proceedings of the 10th USENIX Security Symposium,Washington D C,2001-08.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部