期刊文献+

基于概率TTL终值的IP欺骗DDoS防御策略 被引量:1

A Defense Strategy Against IP Spoofed DDoS Based on the Probability of TTL Terminal Values
下载PDF
导出
摘要 利用概率TTL(Time To Live)终值改进IP包过滤技术,结合流连接密度FCD为时间序列的非参数CUSUM算法,可以有效解决IP欺骗DDoS攻击.本文提出一种IP欺骗DDoS的防御策略,并给出了防御模型及模型中主要模块的实现算法. Combining the non-parameter CUSUM algorithm with FCD as time series, the IP spoofed DDoS attacks are solved by using the improved technology of IP packets filtering based on probability of TTL(Time To Live) terminal values. The defense model of IP spoofed DDoS is proposed and the algorithm of the main module is given.
出处 《河南大学学报(自然科学版)》 CAS 北大核心 2006年第4期96-99,共4页 Journal of Henan University:Natural Science
基金 河南省自然科学基金项目(0511011400) 河南省教育厅自然科学基金项目(2004520014)
关键词 分布式拒绝服务攻击 IP欺骗 包过滤 时间序列分析 distributed denial of service IP spoofed packets filtering time series analysis
  • 相关文献

参考文献7

  • 1PEHA Jon M. Protocols Can Make Traffic Appear Self-Similar [C]. Proceedings of IEEE/ACM/SCS Communication Networks and Distributed Systems Modeling and Simulation Conf. , 1997:47-52.
  • 2JIN Cheng, WANG Haining, SHIN Kang G. Hop-Count Filtering: An Effective Defense Against Spoofed DDoS Traffic[C]. ACM Conference on Computer and Communications Security (CCS)'2003, Washington DC,2003: 30-41.
  • 3TAKADA H, HOFMANN U. Application and Analyses of Cumulative Sum to Detect Highly Distributed Denial of Service Attacks using Different Attack Traffic Patterns [J]. Inter-domain QoS Newsletter,2004(7).
  • 4忽海娜,程明.基于包过滤的DDoS防御系统[J].天津理工大学学报,2005,21(5):37-39. 被引量:2
  • 5任冬冬,杨东勇.基于UDP的分布式拒绝服务攻击的自相似性研究[J].计算机应用,2005,25(2):409-411. 被引量:3
  • 6孙钦东,张德运,高鹏.基于时间序列分析的分布式拒绝服务攻击检测[J].计算机学报,2005,28(5):767-773. 被引量:55
  • 7PENG Tao, LECKIE C, KOTAGIRI R. Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring [C]. Proceedings of the Third international IFIP-TC6 Networking Conference (Networking 2004). Greeee:Athens, 2004: 771-782.

二级参考文献31

  • 1孙钦东,张德运,孙朝晖,张晓.基于流连接密度的分布式拒绝服务攻击检测[J].西安交通大学学报,2004,38(10):1048-1052. 被引量:5
  • 2LELAND WE, TAQQU MS, WILLINGER W, et al. On the selfsimilarity nature of Ethemet traffic[ A], in Proc ACM SIGCOMM[C], 1993.183-193.
  • 3PAXSON V, FLOYD S. Wide-Area Traffic: The failure of Poisson modeling[ J]. in IEEE/ACM Trans on Networking, 1995, 3(3):226.
  • 4CROVELLA ME, BESTAVROS A. Self-similarity in World Wide Web traffic: Evidence and possible cause[ J]. in IEEE/ACM Trans on Networking, 1977, 6:835 -846.
  • 5POPESCU A. Traffic Self-Similarity[ A]. (invited) tutorial, IEEE International Conference on Telecommunications, ICT2001 [ C].Jun, 2001.
  • 6PARK K, KIM G, CROVELLA M. On the effect of self - similarity on network performance[ A]. in Proc of the SPIE International Conf on Performance and Control of Network System[ C], 1997.296-310.
  • 7OST A, BOUDEWIJN RH. Modeling and Evaluation of pseudo selfsimilar traffic with Infinite-State Stochastic Petri Nets[ A]. in Proc of the workshop on formal method and telecom[ C], 1999. 120 - 136.
  • 8PEHA JM. Protocols can make traffic appear self- similar [ A ] . in Proc of the 1997 IEEE/ACM/SCS Comm. Networks and Distributed System. Modeling and Simulation Conf[ C], 1997. 47 -52.
  • 9VERES A, BODA M. The chaotic nature of TCP congestion control[ A]. in Proc IEEE INFOCOM 2000, Tel Aviv, Israel[ C], 2000.1715 - 1723.
  • 10HU G, DOLZER K, GAUGER CM. Does Burst Assembly Really Reduce the Self-Similarity[ J]. Conference on Optical Fiber Communication( OFC2003). Technical Digest Series, 2003, 86:124 - 126.

共引文献57

同被引文献7

  • 1包怀忠,马季.IP网络路由追踪技术研究[J].微电子学与计算机,2004,21(8):59-62. 被引量:3
  • 2Bellovin S.Security Problems in the TCP/IP Protocol Suite[C]/ /ACM SIGCOMM Computer Communications Review.New York:ACM Press,1989:32-48.
  • 3Kurose J F,Ross K W.Computer Networking:A top-down Approach Fe aturing the Internet[M].北京:机械工业出版社,2006.
  • 4Doyle J.CCIE #1919.Routing TCP/IP Volume 1[M].北京:人民邮电出版社,2003.
  • 5Stevens W R.TCP/IP详解.卷一.协议[M].范建华等译.北京:机械工业出版社,2004.
  • 6Tanenbaum A S.计算机网络[M].第4版.潘爱明,译.北京:清华大学出版社,2004:31-40.
  • 7佚名.IP欺骗原理精解和防范手段综述[EB/OL].2005-04-03.http://www.gipsky.com/modules/wfsection/article.php?articleid=5.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部