期刊文献+

DDoS攻击检测研究综述 被引量:5

A Survey of Detection Research on DDoS Attack
下载PDF
导出
摘要 DDoS攻击作为当前网络安全最严重的威胁之一,近年来随着僵尸网络的盛行,其攻击影响日趋扩大,因此对DDoS攻击进行检测变得尤为重要。本文按照攻击层次和检测位置的不同,对于不同的DDoS攻击检测方法给出了详细的分类,同时在此基础上对各类检测方法进行分析和性能比较,明确了各种检测方法的特点和应用范围,最后讨论了当前攻击检测存在的问题及进一步研究的方向。 With the prevalence of botnets,The DDoS attack,as one of the threats in the network,gradually expands its effection,therefore it is significant to detect the DDoS attack.This paper detailedly classifies the methods for DDoS attack detection according to the attack level and detection position.At the same time,on the basis of classification,various detection methods are taken into comparison.The character and application scope of various detection methods are ensured.At last,this paper also gives a discussion on the problem in this field and the next work,in order to provide the reference for the future study.
出处 《电信科学》 北大核心 2011年第3期85-89,共5页 Telecommunications Science
基金 国家自然科学基金资助项目(No.60873097) 重庆市自然科学基金重点资助项目(No.CSTC2009BA2089) 重庆市教委科学技术研究项目(No.KJ100508)
关键词 分布式拒绝服务攻击 攻击检测 分层检测 检测位置 DDoS attack attack detection stratified detection detection position
  • 相关文献

参考文献24

  • 1Yann Labit,Johan Mazel. HIDDEN: hausdorff distance based intrusion detection approach dedicated to networks. In: Proc of ICIMP'08, Bucharest, July 2008.
  • 2陈伟,何炎祥,彭文灵.一种轻量级的拒绝服务攻击检测方法[J].计算机学报,2006,29(8):1392-1400. 被引量:26
  • 3Michael Walfish, Mythili Vutuku, Hari BaIabshnan, et al. DDoS defense by offense.In:Proc of SIGCOMM '06,Pisa,ltaly,Sept 2006.
  • 4周再红,谢冬青,熊伟,杨小红.一种基于带权CAT的DDoS分布式检测方法[J].武汉大学学报(理学版),2008,54(5):626-630. 被引量:2
  • 5Georgios Oikonomou,Jelena Mirkovic.Modeling human behavior for defense against flash-crowd attacks. In: Proc of ICC'09, Dresden, June 2009.
  • 6田俊峰,朱宏涛,孙冬冬,毕志明,刘倩.基于用户信誉值防御DDoS攻击的协同模型[J].通信学报,2009,30(3):12-20. 被引量:9
  • 7Malliga S, Tamilarasi A, Janani M. Filtering spoofed traffic at source end for defending against DoS/DDoS attacks.In:Proc of ICCCn 2008, St Thomas, VI, Dec 2008.
  • 8HyunGon Kim. Protection against packet fragmentation attacks at 6LoWPAN adaptation layer.ln:Proc of ICHIT'08, Daejeon, Aug 2008.
  • 9张洁,武装,陆倜.一种改进的ARP协议欺骗检测方法[J].计算机科学,2008,35(3):52-54. 被引量:11
  • 10Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal, et al. DDoS-shield: DDOS-resilient scheduling to counter application laye attacks. IEEE/ACM Transactions on Networking,2009,17(1): 26-39.

二级参考文献106

共引文献96

同被引文献76

引证文献5

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部