期刊文献+

低速率拒绝服务攻击研究综述 被引量:20

A survey of Low-rate Denial-of-Service attacks
下载PDF
导出
摘要 低速率拒绝服务攻击是近年来提出的一类新型攻击,其不同于传统洪泛式DoS攻击,主要是利用端系统或网络中常见的自适应机制所存在的安全漏洞,通过低速率周期性攻击流,以更高的攻击效率对受害者进行破坏且不易被发现。LDoS攻击自提出以来便得到了研究者们的充分重视,其攻击特征分析与检测防范方法逐渐成为网络安全领域的一个重要研究课题。首先对目前已提出的各种LDoS攻击方式进行了分类描述和建模,并在NS2平台上进行了实验验证,接着对LDoS攻击的检测防范难点进行了讨论并对已有的各种检测防范方案进行了小结,最后指出了有待进一步研究的几个问题,以期为今后此类攻击检测防范研究工作提供参考。 Low-rate denial-of-service adaptive behavior exhibited by several attack is a novel category of attacks that are network and system protocols. Different from aimed at traditional exploiting DoS attacks, this kind of attacks can make serious destroy on the victims by using periodically non-suspicious low-rate attack streams. Since they have been brought forward, these new attacks have caused special concern; the problems of detecting and defending towards them have gradually become important research issues in the network security area. In the paper, theoretical analyses, modeling and simulations of various LDoS attacks are presented, the difficulties of defending and current solutions are discussed. At the end of the paper, several problems which need further researches are put forward, in order to provide reference to the future research work on the defending of this kind of attacks.
出处 《计算机科学与探索》 CSCD 2008年第1期1-19,共19页 Journal of Frontiers of Computer Science and Technology
基金 the National Natura lScience Foundation of China under Grant No.60642006,60773008(国家自然科学基金).
关键词 网络安全 低速率拒绝服务攻击 TCP拥塞控制 AQM 攻击防范 network security Low-rate DoS (LDoS) attacks TCP congestion control AQM attack defense
  • 相关文献

参考文献10

  • 1Feng W.Techniques for eliminating packet loss in con-gested TCP/IP networks. CSE2TR349-97 . 1997
  • 2Feng W C,Kandlur D D,Saha D.A self-configuring RED gateway[].INFOCOM’Proceedings of Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies.1999
  • 3Lakshman T V,Wong L H.SRED:stabilized RED[].Proceeding of IEEE INFOCOM.1999
  • 4Chan M C.Effect of malicious synchronization[].theth International Conference on Applied Cryptography.2006
  • 5McCanne S,Floyd S.ns-LBNL network simulator. http://www-nrg.ee.lbl.gov/ns/ . 1996
  • 6Specht S,Lee R.Distributed denial of service:taxo-nomies of attacks[]./Tools and CountermeasuresPro-ceeding ofPDCS.2004
  • 7Chang R K C.Defending against flooding-based dis-tributed denial-of-service attacks:a tutorial[].IEEE Communications Magazine.2002
  • 8Stone1R.Centertrack:an IP overlay network for track-ing DoS floods[].Theth USENIX Security Symposium.2000
  • 9Sun H,Lui J,Yau D.Defending against low-rate TCP attacks:dynamic detection and protection[].Proceedings of ICNP’:theth IEEE International Conference on Network Protocols.2004
  • 10Sun H,Lui J C S,Yau D K Y.Distributed mechanism in detecting and defending against the low-rate TCP at-tack[].Computer Networks.2006

同被引文献134

引证文献20

二级引证文献75

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部