期刊文献+

面向P2P网络的DDoS攻击抑制方法 被引量:2

Method to Inhibit DDoS Attack for P2P Overlay Network
下载PDF
导出
摘要 提出了一种分布式的基于对P2P网络中各节点进行分级的DDoS攻击抑制方法。采集了多个能分别反映当前节点本身或周围节点网络状况的评级因子,并通过不确定性推理确定当前节点分级值。分级值决定转发率。使用线性分类作为丢包策略对需发送数据包进行分组、丢弃,以降低误报率。仿真实验表明该方法能够有效抑制P2P网络上的DDoS攻击,提高整个网络抗攻击弹性。 A novel distributed method based on peer level model is presented to inhibit DDoS attack.The level model collects four factors including the behaviors of the current peer and its network status to evaluate level value by uncertain inference.Forwarding rate is decided by level value.The data on each peer are sorted by linear classifier and then discarded according to level value.Simulation experiment indicates this method could inhibit DDoS attack and enhance resilience of P2P overlay network.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2011年第1期85-89,共5页 Journal of University of Electronic Science and Technology of China
基金 中央高校基本科研业务费专项资金(ZYGX2009J090)
关键词 分布式拒绝服务攻击 网络安全 覆盖网 分类器 distributed denial of service network security overlay network pattern classification
  • 相关文献

参考文献14

  • 1CNNIC.第23次中国互联网络发展状况统计报告[EB/OL].2009-1-12.http://www.cnnic.net.cn/html/Dir/2009/01/12/5447.htm.
  • 2夏春和,石昀平,李肖坚.结构化对等网中的P2P蠕虫传播模型研究[J].计算机学报,2006,29(6):952-959. 被引量:26
  • 3MOORE D, SHANNON C, BROWN D, et al. Inferring intemet denial of service activity[J]. ACM Transactions on Computer Systems, 2006, 24(2): 115-139.
  • 4任超,李战怀,张英.异构P2P网络的分布式查询协议[J].电子科技大学学报,2009,38(1):108-112. 被引量:6
  • 5XIAO Bin, CHEN Wei, HE Yan-xiang, et al. An active detecting method against SYN flooding attack[C]//11th International Conference on Parallel and Distributed Systems Workshops. Fukuoka, Japan: IEEE, 2005:709-715.
  • 6高能,冯登国,向继.一种基于数据挖掘的拒绝服务攻击检测技术[J].计算机学报,2006,29(6):944-951. 被引量:44
  • 7LEE J W, GUSTAVO De V. Scalable multicast based filtering and tracing framework for defeating distributed DoS attacks[J]. International Journal of Network Management, 2005, 15(1): 43-60.
  • 8ENGLE M, KHAN J I. Vulnerabilities of P2P systems and a critical look at their solutions[J/OL]. [2006-11-01]. http://medianet.kent.edu/techreports/TR2006-11-01-p2pvuln -EK.pdf.
  • 9KEROMYTIS A D, MISRA V, RUBENSTEIN D. SOS: secure overlay services[C]//ACM SIGCOMM 2002 Conference. Pittsburgh, USA: ACM, 2002: 61-72.
  • 10SRIPANIDKULCHAI K. The popularity of Gnutella queries and its implications on scalability[EB/OL]. [2009-01-19]. http://www.cs, cmu.edu/-kunwadee/research/ p2p/gnutella.html, 2001.

二级参考文献42

  • 1王丹.P2P系统资源查询机制研究综述[J].计算机科学,2004,31(9):57-59. 被引量:1
  • 2曹华梁,朱星,俞勇.适用于P2P的系统查询扩展优化方法[J].上海交通大学学报,2005,39(10):1706-1710. 被引量:5
  • 3张骞,张霞,刘积仁,孙雨,文学志,刘铮.混合P2P环境下有效的查询扩展及其搜索算法[J].软件学报,2006,17(4):782-793. 被引量:9
  • 4刘涛,张志明.一种基于P2P网络Gnutella模型的查询策略[J].计算机应用与软件,2006,23(6):53-55. 被引量:2
  • 5SkoudisEd.反击黑客[M].北京:机械工业出版社,2002..
  • 6POUWELSE J A, GARBACKI P, EPEMA D H J, et al. A measurement study of the bit torrent Peer-to-Peer file- sharing system[C]//Proceedings of the Multimedia Computing and Networking (MMCN). San Jose, California, USA: SPIE, 2002: 281-297.
  • 7STOICA I, MORRIS R, LIBEN-NOWELL D, et al. Chord: a scalable peer-to-peer lookup protocol for lnternet applications[J]. IEEE/ACM Transactions on Networking, 2003, 11(1): 17-32.
  • 8RATNASAMY S, HANDLEY M, KARP R, et al. Topologically-aware overlay construction and server selection[C]//Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. New York, USA: IEEE, 2002:1190-1199.
  • 9GUMMADI K P, SAROIU S, STEVEN D G, et al. Estimating latency between arbitrary internet end hosts[C]//Intemet Measurement Conference. Marseille, France: ACM, 2002: 5-18.
  • 10MAYMOUNKOV P, MAZ1ERES D. Kademlia: a peer-to- peer information system based on the XOR metric[J]. Peer-to-Peer Systems, 2002, 2429: 53-65.

共引文献79

同被引文献21

  • 1谭艳霞,吴灏.基于免疫的对等网络DoS攻击防御系统[J].计算机工程与设计,2006,27(22):4204-4206. 被引量:2
  • 2马新新,赵洋,秦志光.Improving Resilience against DDoS Attack in Unstructured P2P Networks[J].Journal of Electronic Science and Technology of China,2007,5(1):18-22. 被引量:6
  • 3Wagner A, Plattner B. Peer-to-Peer Systems as Attack Platform for Distributed Denial-of-Service[EB/OL]. (2002-12-10). http://www. tik.ee.ethz.ch/-ddosvax/publications/papers/sact2002.pdf.
  • 4Sun Xin, Torres R, Rao Sanjay. Preventing DDoS Attacks on Internet Servers Exploiting P2P Systems[J]. Computer Networks, 2010, 54(15): 2756-2774.
  • 5NAOUMOV N, ROSS K. Exploiting P2P systems for DDoS attacks [ C ]//Proc of the 1 st International Conference on Scalable Information Systems. New York: ACM Press,2006.
  • 6DASWANI N, GARCIA-MOLINA H. Query flood DoS attacks in Gnutella networks [ C ]//Proc of the 9th ACM Conference on Computer and Communications Security. New York : ACM Press ,2002 : 181-192.
  • 7ATHANASOPOULOS E, ANAGNOSTAKIS K G, MARKATOS E P. Misusing unstructured P2P systems to perform DoS attacks the network that never forgets [ C ]//Proc of the 4th International Conference on Applied Cryptography and Network Security. 2006 : 130-145.
  • 8莫宏为.人工免疫系统原理与应用[M].哈尔滨:哈尔滨工业大学出版社,2003.
  • 9莫宏为,左兴权.人工免疫系统[M].北京:科学出版社,2009.
  • 10李敏强,寇纪淞,林丹,等.遗传算法的基本理论与应用[M].北京:科学出版社,2009.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部