期刊文献+

MDCI:一个分布式检测DDoS攻击的方法 被引量:1

MDCI: a Distributed Approach to DDoS Attacks Detection and Response
下载PDF
导出
摘要 鉴于DDoS攻击分布式、汇聚性的特点,实现分布在大规模网络环境中的多个IDS系统间合作检测有助于在攻击流形成规模前合成攻击全貌并适当反应.MDCI系统首次提出了环形合作模式,即构建一个环重要网络信息资源的IDS系统合作组,通过组内节点间信息共享和警报关联分析,迅速判定DDoS攻击.MDCI系统中,采用报头内容分析和反向散射分析相结合的方法对本地捕获的数据报进行分析并采用统一标准格式对可疑特征进行报警;采用数据流分类概率评估的方法实现合作结点间警报信息的关联分析,从而合成攻击的全貌.通过实验可以看到,该系统有效地提高了针对DDoS攻击的预警速度. Considering the distributed, aggregation nature of Distributed Denial of Service (DDoS) attacks, the data sharing and the cooperative detection among IDS systems distributed in a large scale network is critical important to piece together attack scenario before it aggregated into overwhelming flooding. The cooperative circle model is firstly proposed in MDCI system that means to set up a cooperative defense circle of IDS systems surrounding valuable network assets. With the information exchanging and alerts correlating among sites in the circle, the DDoS attacks can be identified more quickly and accurately. In MDCI system, the packet header contents analysis and backscatter analysis technologies are adopted to identify the attack signature with the information captured locally. The alerts in uniformed format are shared among the cooperative cites and the category probability evaluation method is used to form the overall attack scenarios. Through some experiments, we can conelude that the MDCI system improves detection performance effectively.
出处 《小型微型计算机系统》 CSCD 北大核心 2006年第1期58-61,共4页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(90204014)资助 吉林省自然科学基金项目(20030516-2)资助.
关键词 入侵检测系统 DDOS攻击 环形合作检测 反向散射分析 intrusion detection system DDoS attack circular cooperative detection backscatter analysis
  • 相关文献

参考文献6

  • 1Polla D, McConnell J, Johnson T et al. A framework for cooperative intrusion detection[C]. 21st National Information Systems Security Conference, 361-373, October 1998.
  • 2Koutepas G, Stamatelopoulos F, Hatzigiannakis Vet al. An adaptable inter-domain infrastructure against DoS attacks [C].International Conference on Advances in Infrastructure for eBusiness, e-Education, e-Science, e-Medicine, and Mobile Technologies on the Internet, L'Aquila, Italy, lanuarv 2003.
  • 3Moore D, Voelker G, Savage S. Inferring internet denial of service activity[C]. In Proc. Usenix Security Symposium 2001.
  • 4Kendall Giles, David Marchette, Carey Priebe. On the spectralanal ysis of backscatter data[C]. Proceedings of the Hawaii International Conference on Statistics, Mathematics, and Related Fields, 2004.
  • 5Kriigel C, Toth T. Distributed pattern detection for intrusiond etection[C]. Conference Proceedings of the Network and Distributed System Security Symposium NDSS '02, 2002.
  • 6杨余旺,杨静宇,孙亚民.分布式拒绝服务攻击的实现机理及其防御研究[J].计算机工程与设计,2004,25(5):657-660. 被引量:15

二级参考文献14

  • 1Tripwire. Tripwire for servers [R/OL]. http:∥www. tripwire.com/products/servers/.
  • 2David Moore, Ram Periakaruppan, Jim Dono-hoe, et al.Where in the world is net-geo.caida.org? [C]. INET 2000Proceedings, 2000.
  • 3CERT Coordination Center. Trends in denial of service attacktechnology[R/OL]. 2001.
  • 4Jelena Mirkovic, Janice Martin, Peter Reiher. A taxonomy of DDoS attacks and DDoS defense mechanisms[R]. Computer Science Department University of California, Los Angeles Technical Report #020018,2001.
  • 5王国伟. 网络安全分布式 DDOS 攻击 [N/OL]. http:∥it.rising.com.cn/.
  • 6Howard J D, Longstaff T A. A common language for computer security incidents [R/OL]. Sandia Report: SAND 98-8667, Sandia National Laboratories, http:∥www. cert.org/research/taxonomy_988667.pdf.
  • 7Axelsson S. Intrusion detection systems: A survey and taxonomy [R/OL]. Technical Report 99-15, Department of Computer Engineering, Chalmers University, 2000.
  • 8Debar H, Dacier M, Wespi A. Towards a taxonomy of intrusion-detection systems[J]. Computer Networks, 1999,31(8):805-822.
  • 9Hafner K, Markoff J. Cyberpunk: Outlaws and hackers on the computer frontier[M]. Simon & Schuster, 1991.21-140.
  • 10Bellovin S, LeechM, TaylorT. ICMPtracebackmessages[R/OL]. 2001. Internet draft, Work in progress. http:∥search.ietf. org/internet-drafts/draft-ietf-itrace-01.txt.

共引文献14

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部