期刊文献+

一种针对DDoS flooding攻击的异常检测方案 被引量:2

Anomaly Detection Solution for DDoS Flooding Attack
下载PDF
导出
摘要 随着网络用途的不断扩大和Internet互联网络带宽的增加,网络遭受攻击的形式也越来越多,越来越复杂。分布式拒绝服务攻击DDoS是互联网环境下最具有破坏力的一种攻击方式,尤其以TCP flooding和UDP flooding攻击为代表。文中通过分析DDoS flooding的攻击特点和TCP协议的连接过程,利用网络流量的自相似性等特点,设计出一种针对DDoS flooding攻击的异常检测方案。 With the rapid development of the Internet in recent years, network attacks happen frequently and various kinds of attack methods appear ceaselessly. DDoS is the one of the most frequent attacks in the Internet, especially TCP flooding attack and UDP flooding attack. The characteristic of DDoS flooding attack and the connective process of TCP protocol, is analysed, used the self-similar speciality of network flux, and designed a anomaly detection solution for DDoS flooding attack.
作者 王鸥 李孝安
出处 《科学技术与工程》 2007年第19期5146-5149,共4页 Science Technology and Engineering
关键词 异常检测 DDOS FLOODING TCP UDP anomaly detection DDoS flooding TCP UDP
  • 相关文献

参考文献7

  • 1[1]Schneier B.Secrets and lies:digital security in a networked world.John Wiley & Sons Inc,https://portal.acm.org,2000
  • 2[2]CERT/CC.results of the distributed-systems intruder tools workshop.technical report,http://www.cert.org/reports/dsit_workshop-final.html,1999
  • 3[3]Douligeris C,Mitrokotsa A.DDoS attacks and defense mechanisms:classification and state-of-the-art.Computer Networks,2004;(44):643-666
  • 4[4]Siaterlis C,Maglaris B.Detecting DDoS attacks with passive measurement based heuristics.In:Proceedings of the 9th International Symposium of Computers and Communications.July 2004
  • 5[5]Crovdla M E,Bestavros A.Self-similarity in world wide web traffic:evidence and possible causes.IEEE ACM Tranactions on,Networking,1997
  • 6[7]Kim Y,Lau W C,Chuah M,et al.PacketScore:statistics-based overload control against distributed denial-of-service attack.IEEE In-form Conference on computer Communications,2004; 5 (6):835-846
  • 7[9]Tcmcat.netsraft.Apache.http://www.netsraft.co.uk,2005

同被引文献7

  • 1林楷 贾春.DoS攻击及其防御.IT技术应用,2007,2(19):24-25.
  • 2Kenusoo Lee,Juhyun Kim,et al. DDoS Attack Detection Method Using Cluster Analysis[J].ScienceDirect,2008,1(34):1659-1665.
  • 3Udaya Kiran Tupakula, Vijay Varadharajan. Tracing DDoS Floods:An Automated Approach [J].Network and Systems Management,2004,1 (12): 111-135.
  • 4G.Koutepas,F.Stamatelopoulos. Distributed Management Architecture for Cooperative Detection and Reaction to DDoS Attacks[J]. Network and Systems Management,2004,1(12):73-94.
  • 5胡龙茂,周健,张伟.基于SYN的DDoS攻击的判定和过滤机制[J].微计算机信息,2008,24(15):74-76. 被引量:3
  • 6韩军,李卫.基于用户端控制的DDoS防范模型的研究[J].航空计算技术,2000,30(2):35-36. 被引量:6
  • 7吕慧勤,张宏,罗守山,杨义先.无缓冲服务的DoS攻击[J].北京邮电大学学报,2003,26(3):61-65. 被引量:6

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部