期刊文献+

基于信息熵的多Agent DDoS攻击检测 被引量:5

Multi-Agent DDoS Attack Detection Based on Information Entropy
下载PDF
导出
摘要 分布式拒绝服务攻击(DDoS)在短时间内产生大量的数据包,可以迅速耗尽网络或者主机的资源,对Internet的稳定性造成了巨大威胁。文中通过分析DDoS攻击的原理及攻击者的行为方式,划分攻击阶段,提取攻击特征,据此建立多Agent DDoS检测模型并分配各Agent的任务。模型由熵检测算法捕捉网络数据包的异常,再由DDoS的Ontology推断出攻击的具体情况。根据在DARPA 2000入侵检测数据集上的实验结果,模型对DDoS攻击的准备阶段和实施阶段有较高的识别率。 Distributed Denial of Service (DDoS) attacks generate enormous packets, and can easily exhaust the resource of a network or a host within a short period of time. It imposes a very serious threat to the stability of the Internet. This paper analyses the attacking rules and attacker's behaviors of DDoS, and then proposes a DDoS attack detection model based on multi-agent. The model uses the entropy detection algorithm to detect abnormal packets, and deduces details of the attack using specific DDoS Ontology. The experiment is based on DARPA 2000 Intrusion Detection Scenario Specific Data Set. The results indicate that this method can effectively detect DDoS attacks.
作者 唐鹏 张自力
出处 《计算机科学》 CSCD 北大核心 2008年第3期292-295,共4页 Computer Science
基金 重庆市自然科学基金资助
关键词 多智能代理 信息熵 本体 分布式拒绝服务 Multi-agent, Information entropy, Ontology,DDoS
  • 相关文献

参考文献17

  • 1Chang R K C. Defending against flooding-based distributed denial-of-service attacks: a tutorial, IEEE Communication Magazine, 2002,40 (10): 42-51
  • 2EBay W M, Buy A. com hit by attacks. IDG News Service, 2000
  • 3David J, et al. Results of the distributed-systems intruder tools workshop. Published at the CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, Nov. 1999
  • 4Cabrera J B D, et al. Proactive detection of distributed denial of service attacks using MIB traffic variables-A feasibility study. In: The seventh IEEE/IFIP International Symposium on Integrated Network Management Proceeding, May 2001. 609~622
  • 5Lee F, Shieh S. Defending against spoofed DDoS attacks with path fingerprint. Computers and Security, 2005, 24(7): 571-586
  • 6Gavrilis D,Dermatas E. Real-time detection of distributed denial- of-service attacks using RBF networks and statistical features. Computer Network,2005, 48 (2): 235-245
  • 7Kotenko I. Teamwork of Hackers-Agents: Modeling and simulation of coordinated distributed attacks on computer networks. Multi-Agent Systems and Applications Ⅲ. In:Proceedings of 3rd International Central and Eastern European Conference on Multi- Agent Systems, 2003, 2691:464-474
  • 8Bradshaw M. An introduction to software agents. Software Agents, chapter 1. AAAI Press/The MIT Press, 1997
  • 9Jansen W, et al. Applying mobile agents to intrusion detection and response: [NIST Interim Report (IR)-6416]. Oct. 1999
  • 10Peng T, Leckie C, Ramamohanarao K. Detecting distributed denial of service attacks by sharing distributed beliefs. Information Security and Privacy. Wollongong,2003. 9-11

同被引文献43

引证文献5

二级引证文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部