期刊文献+

面向DDoS的容侵参数研究 被引量:2

Research on intrusion tolerance parameters facing DDoS attacks
下载PDF
导出
摘要 通过对分布式拒绝服务(DDoS)攻击原理的深入研究,攻击参数的形式化分析和推导,以及仿真实验,揭示了 DDoS 攻击与带宽、CPU 处理能力、内存、攻击速度、TCP 连接缓冲池等参数之间的关系,指出了承载 N 倍于处理速度的 DDoS 攻击所需的系统指标,提出了针对 DDoS 的容侵参数、CPU 处理能力、内存和 TCP 连接缓冲池,为 DDoS 攻击的防御打下了坚实的基础。 Based on analysis of the DDoS(distributed denial of service) attack mechanisms, formal deduction of attacking parameters and simulation study of DDoS attack, the paper gives the functional relationship between DDoS attacking effect and impacting parameters, such as network bandwidth, CPU processing ability, memory size, attacking speed, TCP connection buffer size. The systematic requirements to stand DDoS attack which is N times of the CPU processing ability are pointed out. Also, the intrusion-tolerance parameters against DDoS attack are proposed, including CPU processing ability, memory size and TCP connection buffer size. The proposal of these requirements and parameters can greatly improve the ability to defend computer systems against DDoS attack.
出处 《高技术通讯》 EI CAS CSCD 北大核心 2008年第11期1123-1129,共7页 Chinese High Technology Letters
基金 863计划((2006AA01Z451 2007AA010503)
关键词 形式化 DDOS攻击 容侵参数 连接缓冲池 formalization, DDoS attack, intrusion tolerance parameter, connection buffer
  • 相关文献

参考文献21

  • 1CERT Coordination Center Software Engineering Institute of Carnegie Mellon University. Denial of Service Attacks. http://www. cert. org/tech-tips/denial-of-service. html,CERT Coordination Center, 1997
  • 2Mirkovic J, Prier G. Attacking DDoS at the source. In: Proceedings of the 10th IEEE International Conference on Network Protocols, Paris, France, 2002. 312-321
  • 3Lakshminarayanan K, Adldns D, Perrig A, et al. Taming IP packet flooding attacks. Computer Communication Review, 21304, 34 ( 1 ) : 45-50
  • 4Anderson T, Roscoe T, Wetherall D. Preventing Intemet denial of service with capabilities. ACM SIGCOMM Computer Communication Review, 2004, 34(1):39-44
  • 5Ferguson P, Senie D. Network ingress filtering: defeating denial of service attacks that employ IP source address spoofing. Internet RFC 2827, 2000
  • 6Handley M, Greenhalgh A. Steps towards a DoS-resistant internet architecture, In: Proceedings of the ACM SIGCOMM workshop on future directions in network architecture, Portland, Oregon, USA, 2004. 49-56
  • 7Wang H, Zhang D, Shin K G. Detecting SYN flooding attacks. In: Proceedings of the Annual Joint Conference of the IEEE Computer Society and Communications Society (INFOCOM), New York, USA, 2002,3. 1530-1539
  • 8Jin C, Wang H N, Shin K G. Hop-count filtering: an effective defense against spoofed DDoS traffic. In: Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS), Washington, DC, USA, 2003. 30-41
  • 9Ferguson P, Senie D. Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. http://www. ieff. org/rfc/rfe2827.txt
  • 10Yang X W , Wetherall D, Anderson T. A DoS limiting net- work architecture. In: Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New York, USA, 2005. 241-252

二级参考文献19

  • 1CERT.CERT Statistics.http://www.cert.org/stats/#incidents
  • 2Park K,Lee H.A proactive approach to distributed DoS attack prevention using route-based packet filtering.Technical Report,CSD00-017,Department of Computer Sciences,Purdue University,2000.http://www.cs.purdue.edu/nsl/dpf-tech.ps.gz
  • 3Savage S,Wetherall D,Karlin A,Anderson T.Practical network support for IP traceback.In:Proc.of the 2000 ACM SIGCOMM Conf.Stockholm,2000.295-306.http://www.acm.org/sigs/sigcomm/sigcomm2000/conf/paper/sigcomm2000-8-4.ps.gz
  • 4McGuire D,Krebs B.Attack on Internet called largest ever.2002.http://www.washingtonpost.com/ac2/wp-dyn/A828- 2002Oct22?
  • 5Lemos R.Attack targets info domain system.ZDNet News,2002.http://zdnet.com.com/2100-1105-971178.html
  • 6CERT.Overview of attack trends,2002.http://www.cert.org/archive/pdf/attack_trends.pdf
  • 7Ferguson P,Senie D.rfc2827,Network ingress filtering:defeating denial of service attacks which employ IP source address spoofing.IETF,May 2000.http://www.ietf.org/rfc/rfc2827.txt
  • 8Song DX,Perrig A.Advanced and authenticated marking schemes for IP traceback.In:Proc.of the IEEE INFOCOM 2001.http://www.ieee-infocom.org/2001/program.html
  • 9Park K,Lee H.On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack.In:Proc.of the IEEE INFOCOM 2001.2001.338-347.http://www.ieee-infocom.org/2001/program.html
  • 10Snoeren AC,Partridge C,Sanchez LA,Jones CE,Tchakountio F,Kent ST,Strayer T.Hash-Based IP traceback.In:Proc.of the ACM SIGCOMM 2001 Conf.2001.San Diego,2001.3-14.http://www.acm.org/sigs/sigcomm/sigcomm2001/p1.html

共引文献28

同被引文献27

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部