期刊文献+

使用补偿非参数CUSUM方法检测DDoS攻击 被引量:13

Detecting DDoS attack based on compensation non-parameter CUSUM algorithm
下载PDF
导出
摘要 提出了一种有效的、在攻击目的端检测DDoS攻击的方法。研究目的是为了在花费较少代价的情况下,早期检测到攻击的存在,记录可疑的攻击包。对基于TCP协议的DDoS攻击而言,从受害端进行观察,会发现很多没有确认的TCP报文段。在每个时间间隔?t,计算未确认的报文段个数与总报文段个数的比值,形成基于时间的统计序列,再用经过改进的非参数递归CUSUM(cumulative sum)算法在线、快速检测DDoS攻击,并在检测的同时记录可疑的攻击包。经实验验证,该检测算法不仅快速,而且具有更低的误报率,能够适应更复杂的网络检测环境。另外,还能为攻击的分析取证和追踪提供一定帮助。 An effective DDoS attack detection method on target-end network was proposed. The main goal was to detect attack in early stages with few expenditure, and record the suspicious packets in the same time. For DDoS attacks which based on TCP, many unacknowledged segments will be observed in victim end. In every time period △t, calculated the ratio of the number of unacknowledged segments and the number of all segments. Then, the statistical sequence based on time came into being. After that, an improved non-parameter recursive CUSUM algorithm was used to detect attack efficiently on line. In this procedure, the suspicious packets were also recorded. Experiments prove that this algorithm is fast and efficient. It has low false-positive rate and could adapt to more complex network environments. In addition, it is helpful to attack analysis and tracing.
出处 《通信学报》 EI CSCD 北大核心 2008年第6期126-132,共7页 Journal on Communications
基金 国家高技术研究发展计划(“863”计划)基金资助项目(2003AA142010) 国家自然科学基金资助项目(60473093) 江苏省高技术研究计划基金资助项目(BG2004030)~~
关键词 信息安全 DDOS 非参数CUSUM算法 攻击检测 TCP 未确认报文段 information security DDoS non-parameter CUSUM algorithm attack detection TCP unacknowledged segments
  • 相关文献

参考文献8

二级参考文献26

  • 1Basseville M,Nikiforov I V.Detection of Abrupt Changes : Theory and Application.Prentice Hall,1993
  • 2Jung J,Krishnamurthy B,Rabinovich M.Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites.Proceedings of 11th Word Wide Web Conference,Honolulu,Hawaii,USA,2002-05-07
  • 3Brodsky B E,Darkhovsky B S.Nonparametric Methods in Change Point Problems.Kluwer Academic Publishers,1993
  • 4Wang Haining,Zhang Danlu,Shin K G.Detecting SYN Flooding Attacks.In Proceedings of IEEE Infocom'2002,2002-06
  • 5Bellovin B.The ICMP Traceback Message.Internet Draft,IETF,2000-03
  • 6Yau D K Y,Lui J C S,Liang Feng.Defending Against Distributed Denial-of-service Attacks with Max-min Fair Server-centric Router Throttles.In Proceedings of IEEE International Workshop on Quality of Service (IWQoS),Miami Beach,FL,2002-05
  • 7Basseville M, Nikiforov I V. Detection of Abrtpt Changes: Theory and Application. Prentice Hall, 1993
  • 8Brodsky B E, Darkhovsky B S. Nonparametric Methods in Change Point Problems. Kluwer Academic Publishers, 1993
  • 9Lakshman T V, Stiliadis D. High Speed Policy-based Packet Forwarding Using Efficient Multi-dimensional Range Matching.Proceedings of ACM SIGCOMM'98, 1998-09
  • 10Mirkovic J, Prier G, Reiher P. Attacking DDoS at the Source. ICNP,2002

共引文献51

同被引文献99

引证文献13

二级引证文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部