期刊文献+

基于行为分布的DDoS攻击检测方法 被引量:1

A method for detecting distributed denial of service attacks based on behavior distribution
下载PDF
导出
摘要 分布式拒绝服务(distributed denial of service,DDoS)攻击能够在短时间内产生巨量的数据包耗尽目标主机或网络的资源,经过研究发现这些伪造的数据包在一个特定的时间内有着合法数据包所不具备的函数特点。因此,本文提出了行为分布的模型,一旦有可疑流流入服务器,则开始计算这些可疑流的行为分布差异,如果该差异小于一个设定的阈值,则判断有DDoS攻击发生;反之则为合法的数据访问。根据NS-3的模拟实验,证明该模型能够有效的从合法访问中区分出DDoS攻击流,对提前控制DDoS攻击的发生具有重要的意义。 A distributed denial of service(DDoS) attack is a common network attack and it is difficult to prevent.A DDoS attack usually generates a huge amount of packages in a very short time and exhausts the resources of the host and network which are attacked.Consequently,DDoS attack is a great threat to the stability of high-speed networks.Many studies have shown that the attack packages are generated by one or several functions.Therefore,the attack packages always share some features that valid packages do not have.This paper introduces the concept of behavior distribution.When suspicious flows arrive at a server,the software calculates the differences in their behavior distribution.If the difference is lower than the threshold,it is deemed a DDoS attack.Otherwise,it is a valid access.The NS-3 experimental results indicate that this method can effectively distinguish a DDoS attack from a valid access and thus contain an attack as soon as possible.
作者 赵英 黄文宇
出处 《北京化工大学学报(自然科学版)》 CAS CSCD 北大核心 2011年第2期108-112,共5页 Journal of Beijing University of Chemical Technology(Natural Science Edition)
基金 国家自然科学基金(20671010)
关键词 DDOS攻击 行为分布 行为分布差异 熵检测 DDoS attack behaviour distribution difference in behaviour distribution entropy detection
  • 相关文献

参考文献6

  • 1Xiao B, Chen W, He Y X. An autonomous defense against SYN flooding attacks: Detect and throttle attacks at the victimside independently[ J ]. Journal of Parallel and Distributed Computing, 2008, 68 (4): 456-470.
  • 2Li Y, Guo L, Tian Z H, et al. A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms [ J ]. Computer Communications, 2008, 31(17): 4018-4025.
  • 3Mao Z M, Large DDoS Proceedings scale attack Sekar V, Spatscheck 0, et al. Analyzing Attacks Using Multiple Data Sources [ C ] // of the 2006 SIGCOMM workshop on Large- defense, Pisa, Italy, 2006: 161-168.
  • 4赵继俊,胡志刚,张健.基于流连接信息熵的DDoS攻击检测算法[J].计算机工程,2007,33(16):139-141. 被引量:3
  • 5Kumar K, Singh J K. A distributed approach using entropy to detect DDoS attacks in ISP domain [ C ] //International Conference of Signal Processing, Communications and Networking, Feb 22- 24, 2007, Chennai, India. vol 1: 331-337.
  • 6Cover T M, Thomas J A. Elements of information theory [ M ]. 2nd Ed. Hoboken : John Wiley & Sons Inc, 2007.

二级参考文献10

  • 1林白,李鸥,刘庆卫.基于序贯变化检测的DDoS攻击检测方法[J].计算机工程,2005,31(9):135-137. 被引量:6
  • 2孙钦东,张德运,高鹏.基于时间序列分析的分布式拒绝服务攻击检测[J].计算机学报,2005,28(5):767-773. 被引量:55
  • 3Lau F,Rubin S H,Smith M H,et al.Distributed Denial of Service Attacks[C]//Proceedings of the IEEE International Conference on Systems,Man,and Cybernetics,Nashville.2000.
  • 4Moore D,Voeker G M,Savage S.Inferring Internet Denial-of-Service Activity[C]//Proceedings of USENIX Security Symposium.2001.
  • 5Wang H N,Zhang D L,Kang G S.Detecting SYN Flooding Attacks[C]//Proc.of INFOCOM'02.2002.
  • 6Xiang Y,Lin Y,Lei W L,et al.Detecting DDOS Attack Based on Network Self-similarity[C]//Proc.of IEEE Int'l Conf.on Communications.2004.
  • 7Tao Peng,Leckie C,Ramamohanarao K.Defending Against Distributed Denial of Service Attack Using Selective Pushback[C]// Proceedings of the 9th IEEE International Conference on Telecommunications,Beijing,China.2002.
  • 8Feinstein L,Schnackenberg D,Balupari R,et al.Statistical Approaches to DDoS Attack Detection and Response[C]//Proc.of the DARPA Information Survivability Conf.and Exposition.2003.
  • 9Tao Peng,Leckie C,Ramamohanarao K.Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring[C]//Proceedings of the 3rd International IFIP-TC6 Networking Conference.2004.
  • 10MIT Lincoln Laboratory.2000 DARPA Intrusion Detection Scenario Specific Data Sets[EB/OL].(2003-10-21).http://www.ll.mit.edu/ IST/.

共引文献2

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部