期刊文献+

低速率TCP拒绝服务攻击的检测响应机制 被引量:5

Detection and response of low-rate TCP-targeted denial of service attacks
下载PDF
导出
摘要 低速率TCP拒绝服务攻击利用传输控制协议(TCP)重传超时机制,爆发时会严重降低合法TCP流吞吐量的流量特性.分析发现,合法流量和包含攻击包流量采样在功率谱密度上存在显著差异.通过分析大量历史数据中这种差异的统计特性,提出了以低频功率和为指标的检测方法.同时基于现有的漏桶限流和增加路由器接收缓存的响应方法,提出了结合包队列和漏桶的响应方法,主要原理是在漏桶周期性平滑流量的同时,将多余流量暂存在一个包队列中以在下一个周期发送.数学分析证明了该响应方法具有合理的资源要求.仿真实验表明,提出的检测方法具有极低的漏报率和误报率,与已有的典型方法相比,提出的响应方法能够在具有一般性的攻击场景下更加有效地抑制攻击流量,并且在已有方法失效的情况下仍能保证吞吐量维持在接近正常的水平. Low rate TCP-targeted denial of service (DOS) attack makes use of time-out and retransmission mechanism in transmission control protocol (TCP) and could severely decrease the throughput of legitimate TCP traffic. With its attacking traffic pattern, obvious difference was found between the power spectrum density (PSD) of legitimate and attack traffic samples. The statistical characteristic of this difference in history data was analyzed, arid a detection method using the summation of low frequency was proposed. Meanwhile, based on the methods of leak bucket and the increasing of routing buffer, a response method was provided, which uses leak bucket periodically for smoothing the flow and uses buffer for holding extra traffic to send in next period, and its reasonable resource requirement was proved. Simulations show that for more general attack scenarios than the existing methods, the detection method has very low positive and negative false ratio, and the response method can depress attack flows more effectively than the previous methods and maintain the iegitimate throughput in a normal level while the orevious methods failed.
出处 《浙江大学学报(工学版)》 EI CAS CSCD 北大核心 2008年第5期757-762,814,共7页 Journal of Zhejiang University:Engineering Science
基金 国家自然科学基金资助项目(60503061) 浙江省自然科学基金资助项目(Y104437,Y106023) 浙江省科技计划资助项目(2005C33034) 新世纪优秀人才支持计划资助项目(NCET-04-0535) 浙江省新世纪151人才工程资助项目 宁波市自然科学基金资助项目(2006A610014)
关键词 拒绝服务 功率谱密度 漏桶 denial of service (DOS) power spectrum density (PSD) leaky bucket
  • 相关文献

参考文献11

  • 1KUZMANOVIC A, KNIGHTLY E. Low-rate TCP-targeted denial of service attacks and counter strategies [J]. IEEE/ACM Transactions on Networking, 2006, 14 (4) : 683 - 696.
  • 2POSTEL J. Internet RFC 793, Transmission control[EB/OL]. [1981-09-18]. http://www.faqs. org/rfcs/ rfc793.html.
  • 3SHEVTEKAR A, KARUNAKAR A, ANSARI N. Low rate TCP denial-of-service attack detection at edge routers [J]. IEEE Communications Letters, 2005, 9 (4): 363- 365.
  • 4LUO X, CHANG R K C. On a new class of pulsing denial-of-service attacks and the defense [C] //Proceeding Network and Distributed System Security Symposium. San Diego: Internet Society, 2005. 67- 85.
  • 5CHEN Y, KWOK Y K, HWANG K. Filtering shrew DDoS attacks using a new frequency-domain approach[C]//Proceeding of IEEE Conference on Local Computer Networks. Tampa:IEEE, 2005 : 786 - 793.
  • 6SUN H, LUI J C S, YAU D K Y. Defending against low-rate TCP attacks: dynamic detection and protection[C] // Proceeding of IEEE International Conference on Network Protocols. Berlin, IEEE. 2004:196- 205.
  • 7SARAT S, TERZIS A. On the effect of router buffer sizes on low-rate denial of service attacks [C]//Proceeding of International Conference on Computer Communications and Networks. San Diego: IEEE, 2005:281-286.
  • 8TSAO J, EFSTATHOPOULOS P. Low-rate TCP-targeted denial of service attack defense[EB/OL]. [2003-09-18]. http://www.cs. ucla. edu/-pefstath/ papers/lowrate.pdf.
  • 9YANG G, GERLA M, SANADIDI M P. Defense against low-rate TCP targeted denial-of-service attacks[C]//Proceeding of International Symposium on Computers and Communications. Alexandria: IEEE, 2004:345-350.
  • 10HUSSAIN A, HEIDEMANN J, PAPADOPOULOS C. Distinguishing between single and multi-source attacks using signal processing [J]. Computer Networks, 2004, 46(4) : 479 - 503.

同被引文献46

  • 1Kuzmanovic A, Knightly E W. Low-rate TCP-targeted denial of service attacks and counter strategies[J].IEEE/ACM Transactions on Networking, 2006, 14(4): 683-696.
  • 2Guirguis M, Bestavros A, Matta I. Exploiting the transients of adaptation for RoQ attacks on internet resources[C]//Proceedings of the 12th IEEE International Conference on Network Protocols. Berlin: IEEE Computer Society, 2004:184-195.
  • 3Guirguis M, Bestavros A, Matta I, et al. Reduction of quality (RoQ) attacks on internet end-systems [C]// Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Miami: IEEE Computer Society, 2005: 1 362-1 372.
  • 4Luo X, Chang R. On a new class of pulsing denial-ofservice attacks and the defense[C]// Proceedings of Network and Distributed System Security Symposium. San Diego: Internet Society, 2005:67-85.
  • 5Zhang Ying, Mao Z M, Wang Jia. Low-rate TCP- targeted DoS attack disrupts internet routing[C]// Proceedings of Network and Distributed System Security Symposium. San Diego: Internet Society, 2007: 135-146.
  • 6Sun H, Lui J, Yau D. Defending against low-rate TCP attacks: dynamic detection and protection[C]// Proceedings of the 12th IEEE International Conference on Network Protocols. Berlin: IEEE Computer Society, 2004:196-205.
  • 7Chen Y, Hwang K. Collaborative detection and filtering of shrew DDoS attacks using spectral analysis [J]. Journal of Parallel and Distributed Computing, 2006. 66(9): 1 137-1 151.
  • 8Kwok Y K, Tripathi R, Chen Yu. Halting anomalies with weighted choking to rescue well-behaved TCP sessions from shrew DDoS attacks[C]// Proceedings of Networking and Mobile Computing. Zhangjiajie:Lecture Notes in Computer Science, 2005:423-432.
  • 9Dong K, Yang S B, Wang S L. Analysis of low-rate TCP DoS attack against FAST TCP[C] // Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications. Jinan:IEEE Computer Society, 2006:86- 91.
  • 10Wei Wei, Dong Yabo, Lu Dongming, et al. A novel mechanism to defend against low-rate denial-of-service attacks[C]// Proceedings of Intelligence and Security Informatics. San Diego: Lecture Notes in Computer Science, 2006: 261-271.

引证文献5

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部