期刊文献+

频域过滤DoS攻击方法的研究 被引量:2

The Approach of Defending Against DoS Attack in Frequency Domain
下载PDF
导出
摘要 拒绝服务DoS(DenialofService)攻击已逐渐成为全世界网络最严重的威胁之一。其攻击方式主要通过连续发送大量的数据包,耗尽网络资源,造成连接阻塞。该文采用数字信号处理的方法对DoS攻击进行分析,并针对其因发送大量数据而具有较大能量的特点,设计参数FIR滤波器来滤除频谱中含有攻击流量的频率分量,提高LAR(LegitimatetraffictoAttackedtrafficRatio),以便有更多的网络资源为用户提供正常的服务。 DoS (Denial of Service) attacks have become one of the most severe security threats to the global Internet increasingly. It makes the resources of Internet used up and incurs congestion by sending a large number of packages constantly. This paper proposes using signal processing method to analyze DoS attacks. Because of sending mass packages, it must have much more power. For this, the FIR filter is designed to filtering the illegitimate frequencies in frequency domain and the LAR (Legitimate traffic to Attacked traffic Ratio) is improved. Then much more resources and service can be supplied for the users.
作者 吴志军 张东
出处 《电子与信息学报》 EI CSCD 北大核心 2008年第6期1493-1495,共3页 Journal of Electronics & Information Technology
基金 国家自然科学基金委员会与中国民用航空总局联合资助项目(60776808) 国家空管委项目(GKG200702020) 中国民航大学科技启动基金(2006年)资助课题
关键词 拒绝服务攻击 谱分析 离散傅里叶变换 滤波器 DoS attack Spectral analysis DFT Filter
  • 相关文献

参考文献7

  • 1Cheng Chen-Mou, Kung H, and Tan Koan-Sin. Use of spectral analysis in defense against DoS attacks. Proceedings of IEEE GLOBECOM, Talpei, China, 2002: 2143-2148.
  • 2Barford P, Kline J, Plonka D, and Ron A. A signal analysis of network traffic anomalies. Proceedings of ACM SIGCOMM Internet Measurement Workshop, Marseilles, France, 2002: 71-82.
  • 3Ferguson P and Senie D. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. RFC 2827, May 2000.
  • 4Barford P and Plonka D. Characteristics of network traffic flow anomalies. Proceedings of ACM SICCOMM Internet Measurement Workshop, San Francisco, CA, November 2001 5-17.
  • 5Chen Yu, HWang Kai, and Kwok Yu-KWong. Collaborative defense against periodic shrew DDoS attacks in frequency domain. Technical Report TR 2005-11, ACM Trans. on Information and System Security, 2005.
  • 6Chen Yu, Hwang Kai, and Kwok Yu-Kwong. Filtering of shrew DDoS attacks in frequency domain. Proceedings of the The IEEE Conference on Local Computer Networks 30th Anniversary, November 15-17, 2005: 786-793.
  • 7Feinstein L, Schnackenberg D, Balupari R, and Kindred D. Statistical approaches to DDoS attack detection and response. DARPA Information Survivability Conf. and Exposition (DISCEX'03), Washington, 2003: 303-314.

同被引文献4

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部