期刊文献+

基于漫游蜜罐的DDoS防御模型设计

Design of defense model based on roaming honeypot for DDoS attacks
下载PDF
导出
摘要 针对当前DDoS防御方法的不足,提出了一种基于漫游蜜罐的DDoS两阶段防御模型。该模型在第一阶段根据DDoS攻击的初期特征,建立简单高效的统计预警模型,并触发下一阶段防御;在第二阶段,应用秩和检验法自动选取检测特征,根据到重心的距离甄别合法与非法流,并对合法流进行漫游。实验结果表明,该模型能较早发现攻击,检测精度高,响应及时。 This paper proposes a two-phase model using roaming honeypot to prevent DDoS attacks due to the deficiency of present detection algorithms.In the first phase,in order to detect the attacks earlier and evoke the next phase,a simple and efficient statistical model is made in the probing stage of DDoS attacks.Then in the second phase,a set of effective detection characteristics is automatically chosen,using rank sum test,to compute distances from barycenter,which is able to differentiate between legal and illegal flows and prepare for roaming the legitimate flows timely.The experimental results show the effectiveness of the model in detecting and responding DDoS attacks.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第33期93-95,共3页 Computer Engineering and Applications
关键词 漫游蜜罐 DDOS攻击 秩和检验 防御模型 roaming honeypot DDoS attacks rank sum test defense model
  • 相关文献

参考文献9

  • 1Khattab S M,Sangpachatanaruk C,Mosse D,et al.Roaming honeypots for mitigating service-level denial-of-service attacks[C]//Proceedings of ICDCS 2004,2004.
  • 2Xu Tu,He Dake,Luo Yu.DDoS attack detection based on RLT features[C]//International Conference on Computational Intelligence and Security, 2007.
  • 3Soejima Y,Chen E Y,Fuji H.Detecting DDoS attacks by analyzing client response patterns[C]//SAINT Workshops,2005:98-101.
  • 4熊雅.基于模糊聚类的DDoS攻击防御模型[J].计算技术与自动化,2007,26(4):121-124. 被引量:1
  • 5Gao Zhi-qiang,Ansari N.Differentiating malicious DDoS attack traffic from normal TCP flows by proactive tests[J].IEEE COMMUNICATIONS LETTERS, 2006, 10( 11 ) : 793-795.
  • 6Xie Yi,Yu Shun-zheng.A novel model for detecting application layer DDoS attacks[C]//Proceedings of the First International Multisymposiums on Computer and Computational Sciences(IMSCCS' 06 ), 2006.
  • 7Hao S,Song H,Jiang W B,et al.A queue model to detect DDoS attacks[C]//Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems,2005.
  • 8MIT Lincoln Laboratory.Information systems technology:DARPA intrusion detection data sets[EB/OL].[2008].http ://www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/index.html.
  • 9盛聚,谢式千,潘承毅.概率论与数理统计[M].北京:高等教育出版社,2003.

二级参考文献13

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部