期刊文献+

融合网络中电信业务DoS攻击的分析与防御

Analysis of DoS Attacks Aiming at Teleservices in Converged Networks and A Defense Measure
下载PDF
导出
摘要 市场对业务的需求促进了现代电信网从传统语音网络向基于IP分组传输的下一代网络演进,IP网络缺乏QoS保证的缺点日益突出,以IP为承载的电信业务面临潜在DoS攻击的威胁,其攻击结果轻则降低用户接通率,严重时可完全阻断电信业务服务。本文首先剖析了融合网络环境下针对电信业务进行DoS攻击的原理及特点,比较了其与传统网络DoS攻击的不同,提出了有效的电信业务DoS攻击检测方法和防御DoS攻击模型。 The increasingly demand of service gives rise to the modern telecommunication network's evolution from traditional voice network to the NGN based on IP packet transmission.The shortcoming that original IP network lacks QoS (quality of service) warranty becomes increasingly critical.The telecom IP services face a great threat of DoS, which will bring down call completion rate even cut off the services.This paper analyzes the principle and main characteristics of DoS attack to the telecom IP services under the environment of converged network, compares the differences between the new attack and traditional DoS attack, and proposes an effective detect method and defense DoS attack model.This model provides effective guarantee for the telecom IP service.
出处 《电信科学》 北大核心 2010年第8期46-52,共7页 Telecommunications Science
基金 国家"863"计划基金资助项目(No.2008AA011001 No.2008AA011002)
关键词 融合网络 电信业务 DOS攻击 信令消息 converged network teleservice DoS signaling message
  • 相关文献

参考文献22

  • 1Hemant Sengar, Ram Dantu, et ol. SS7 over IP: signaling interworking vulnerabilities. IEEE Network, 2006,20 (6): 32-41.
  • 2Hemant Sengar. Securing VoIP and PSTN from integrated signaling network vulnerabilities. VoIP Management and Security.In:1st IEEE Workshop on Vancouver, Canada, Piscataway, New Jersey, USA, 2006.
  • 3The voice over IP security alliance VOIPSA.VoIP Security and Privacy Threat Taxonomy-Public Release 1.0, http://www.voipsa. org/Activities/taxonomy.php, October 2005.
  • 4Al-Mlouni H, Rohiem A E, Hashem M, El-moghazy, et al. VolP denial of service attacks classification and implementation.In: Radio Science Conference,2009.
  • 5Bremler-Barr A, Halachmi-Bekel R, Kangasharju J. Unregister attacks in SIP. 2nd IEEE Workshop on Secure Network Protocols, 2006.
  • 6Thomas Karagiannis, Roido A, Aloutsos M, et al. Transport layer identification of P2P traffic. In: Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, Taormina, Italy, 2004.
  • 7Moore T. Signaling system 7 (SS7) network security. In: Proceedings of the IEEE 45th Midwest Symposium on Circuits and Systems, Aug 2002.
  • 8Sengar H, Wijesekera D, Jajodia S. MTPSec: customizable secure MTP3 tunnels in the SS7 network. In: Proceedings of the 19th IEEE Internationl Parallel and Distributed Processing Symposium,Colorado, 2005.
  • 9黄瑛.电信网络安全现状浅析[J].现代商业,2009(24):232-232. 被引量:2
  • 10傅华,杨义先,温巧燕.七号信令网上的攻击与防范[J].信息网络安全,2003(3):48-50. 被引量:1

二级参考文献5

  • 1陈纲.保障电信网络安全的五项措施[N].通信产业报,2003-9-28.
  • 2David Dittrlch.分布式拒绝服务(DDoS)攻击工具分析—TFN2k[EB/OL].http://www.chinaitab.com/www/news/article_show.asp?id=5336,2002.
  • 3徐一丁..分布式拒绝服务攻击(DDoS)原理及防范[EB/OL]..http://www-900.ibm.com/developerWorks/cn/security/se-ddos/index.shtml,,2002..
  • 4[美]Stuart McClure,Joel Scambray,George Kurtz.黑客大曝光[M].刘江,扬继张,钟向群.北京:清华大学出版社,2003.352—359.
  • 5甘冀平.典型DoS攻击原理及抵御措施[EB/OL].http://www.enet.com.cn/eschool/inforcenter/A20040227289880_2.html,2005.

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部