期刊文献+

基于P2P系统的DDoS攻击及其防御技术研究综述 被引量:4

Research on P2P-based DDoS attacks and their defense mechanism
下载PDF
导出
摘要 首先概述了利用P2P系统进行DDoS攻击的原理,并根据攻击方式的不同将现有研究划分为主动攻击和被动攻击两种。综述了当前针对基于P2P的DDoS攻击的防御方法,分别从基于验证的方法、基于成员管理的方法、基于信誉的方法和受害者端的方法四个方面进行说明。最后,从推动P2P网络安全和Internet网络安全的角度出发,对基于P2P的DDoS攻击及其防御技术未来的研究方向进行了探讨。 This paper first introduced the principle of exploiting P2P systems to perform DDoS attacks,and then classified existing researches as two types: active attacks and passive attacks.Summarized the defense solutions and described them from four aspects: validation-based method,membership-based method,reputation-based method and victim method.Finally,discussed the further directions of P2P-based attacks and their defense mechanism from the view of promoting the safety of P2P network and Internet.
出处 《计算机应用研究》 CSCD 北大核心 2011年第5期1609-1613,共5页 Application Research of Computers
基金 国家"863"计划资助项目(2009AA01Z431) 国家自然科学基金资助项目(60573057 90718017) 东莞市高等院校科研机构科技计划资助项目(2008108101003)
关键词 P2P 分布式拒绝服务攻击 分布式拒绝服务防御 主动攻击 被动攻击 peer-to-peer DDoS attacks DDoS defense active attacks passive attacks
  • 相关文献

参考文献36

  • 1MIRKOVIC J, DIETRICH S, DITTRICH D, et al. Internet denial of service : attack and defense mechanisms [M]. [S. l.]: Prentice Hall PTR,2004.
  • 2PAXSON V. An analysis of using reflectors for distributed denial-of- service attacks [J]. ACM SIGCOMM Computer Communication Review,2001,31 (3) :38-47.
  • 3DASWANI N, GARCIA-MOLINA H. Query-flood DoS attacks in Gnutella networks [C]//Proc of ACM Conference on Computer and Communications Security. 2002.
  • 4LIOGKAS N, NELSON R, KOHLER E, et al. Exploiting BitTorrent for fun (but not profit) [C]//Proc of International Workshop on Peer- to-Peer Systems (IPTPS). 2006.
  • 5DUMITRIU D, KNIGHTLY E, KUZMANOVIC,et al. DeniM-of-service resilience in peer-to-peer file-sharing systems[C]//Proc of ACM SIGMETRICS. 2005.
  • 6WALSH K, SIRER E. Fighting peer-to-peer SPAM and decoys with object reputation[C]//Proc of P2PECON Workshop. 2005.
  • 7SIT E, MORRIS R. Security considerations for peer-to-peer distributed hash tables[C]//Proc of the 1st International Workshop on Peer-to-Peer Systems. 2002.
  • 8CASTRO M, DRUSCHEL P, GANESH A, et al. Security for structured peer-to-peer overlay networks [C]//Proc of OSDI 2002. 2002.
  • 9WALLACH D. A survey of peer-to-peer security issues[C]//Proc of International Symposium on Software Security. 2002.
  • 10ATHANASOPOULOS E, ANAGNOSTAKIS K, MARKATOS. Misusing unstructured P2P systems to perform DoS attacks: the network that never forgets[C]//Proc of ACNS. 2006.

二级参考文献31

  • 1Saroiu S, Gummadi PK, Gribble SD. A measurement study of peer-to-peer file sharing systems. In: Proc. of the Multimedia Computing and Networking 2002 (MMCN 2002). 2002. 156-170. http://www.cs.washington.edu/homes/gribble/papers/mmcn.pdf
  • 2Liang J, Kumar R, Ross KW. The KaZaA overlay: A measurement study. In: Proc. of the 19th IEEE Annual Computer Communications Workshop. 2004. http://cis.poly.edu/-ross/papers/KazaaOverlay.pdf
  • 3Liang J, Kumar R, Ross KW. Understanding KaZaA. 2004. http://cis.poly.edu/-ross/papers/UnderstandingKaZaA.pdf.
  • 4Liang J, Kumar R, Xi Y, Ross KW. Pollution in file sharing systems. In: Proc. of the IEEE Infocom 2005. 2005. http://cis.poly.edu/-ross/papers/pollution.pdf
  • 5Sen S, Wang J. Analyzing peer-to-peer traffic across large networks. In: Proc. of the 2nd ACM SIGCOMM Workshop on Internet Measurement Workshop. 2002. http://citeseer.ist.psu.edu/sen02analyzing.html
  • 6Karagiannis T, Broido A, Brownlee N, Claffy KC, Faloutsos M. Is P2P dying or just hiding. In: Proc. of the IEEE Globecom 2004. 2004. 1532-1538. http://www.caida.org/outreach/papers/2004/p2p-dying/p2p-dying.pdf
  • 7Soldani C. Peer-to-Peer behavior detection by tcp flows analysis (End-of-Study Dissertation). University of Liege, 2004. http://www.run.montefiore.ulg.ac.be/-soldani/P2P_Behaviour_Detection.pdf
  • 8Sen S, Spatscheck O, Wang DM. Accurate, scalable in-network identification of P2P traffic using application signatures. In: Proc of the 13th Int'1 WWW Conf. 2004. http://www2004.org/proceedings/docs/lp512.pdf
  • 9Karagiarmis T, Broido A, Faloutsos M, Claffy KC. Transport layer identification of P2P traffic. In: Proc. of the 4th ACM SIGCOMM Conf. on Internet Measurement. 2004. 121-134. http://www.caida.org/outreach/papers/2004/p2p-layerid/p2p-layerid.pdf
  • 10Karagiannis T, Papagiannaki K, Faloutsos M. BLINC: Multilevel traffic classification in the dark. In: Proc. of the 2005 Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications. 2005. 229-240. http://www.cs.ucr.edu/-tkarag/papers/BLINC_TR.pdf

共引文献35

同被引文献24

引证文献4

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部