期刊文献+

基于欧氏空间距离计算的SynFlood攻击检测方法进一步讨论

Further Discussion on SynFlood Attack Detection Based on Distance Computation in Space Geometry
下载PDF
导出
摘要 基于TCP协议中Syn,Fin和Rst 3种报文段的关系,提出了一种新的SynFlood攻击检测方法:将Syn,Fin和Rst 3者之间的关系映射到欧氏空间中,将某一时间段内的Syn,Fin和Rst的关系映射为一个点,将无攻击行为存在时的Syn,Fin和Rst之间的关系映射为一条线,分析点与线之间的距离来检测SynFlood攻击,同时使用移动平均技术对上述距离进行平滑处理,以提高检测效率和准确度。实验结果表明,该方法对直接式SynFlood攻击和反射式SynFlood攻击均具有较好的检测准确度,并且产生的误报率较低,数据报文处理能力较高,能够部署于大中型网络的骨干路由器上。 This paper gave a new method to detect the SynFlood attack by analyzing the relationship between Syn seg- ment, Fin segment and Rst segment in TCP protocol. Firstly, the relationship between Syn segment, Fin segment and Rst segment is mapped to Space Geo-metry: the relationship in a given time frame is mapped to one point in Space Geo- metry while that when no attack behavior exists is mapped to a line in Space Geometry. The distance between the point to the line can hence be used to detect and determine the SynFlood attack. Furthermore,the efficiency and accuracy are improved by using moving average technology which can anti-aliasing the distance discribed above. The experimental re- sult shows that the method can detect the direct SynFlood attack and the reflect SynFlood attack accurately and have low rate of false alarrrL Also the method can be deployed to mid-large scale networks because of its high performance for processing data packets.
出处 《计算机科学》 CSCD 北大核心 2011年第12期82-87,共6页 Computer Science
基金 国家自然科学基金(60873030)资助
关键词 Syn洪泛攻击 欧氏空间距离 偏离度 移动平均 攻击判别值 SynFlood attack, Distance in space geometry, Deviation, Moving average, Attack discriminant
  • 相关文献

参考文献10

  • 1陈波.SYN Flood攻击的原理、实现与防范[J].计算机应用研究,2003,20(12):80-83. 被引量:11
  • 2Jonathan L. Resisting SYN Flooding DoS Attacks with a SYN Cache[C] // Proceedings of USENIX BSDCon on File and Storage Technologies. San Francisco, California, USA: USENIX, 2002: 89-98.
  • 3Bermtan D J, Schenk E. Linux Kernel SYN Cookies Firewall Project[EB/OL]. http..//www, bronzesoft, org/projects/scfw.
  • 4Netscreen 100 Firewall Appliance[EB/OL]. http://www, netscreen, com/.
  • 5Check Point Software Technologies Ltd. SynDefender[EB/OL]. http://www, checkpoint, com/products/firewall-1.
  • 6Schuba C L,Krsul Ivan V K,Markus G,et al. Analysis of a Denial of Service Attack on TCP[C]//Proceedings of IEEE Symposium on Security and Privacy. Oakland, CA, USA: 1997 IEEE Symposium on Security and Privacy, 1997:208-223.
  • 7Shaikh R A, Iqbal A A, Samad K. Review over Anomaly Detection Algorithms for Detecting SYN Flooding Attacks[C]//Proceedings of Student Conference on Engineering Sciences and Technology. Karachi, Pakistan: CIS Department, NED UET, 2005:1-5.
  • 8Liu Hui-yu, Chen Kai, Chen Xiao-su. SynFlood Attack Detection Based on Distance Computation in Space Geometry[C]//Proceedings of 2010 International Conference on Computer Application and System Modeling. Taiyuan, Shanxi, China: IACSIT, 2010 : V4-585-V4-591.
  • 9严绍宗,童裕孙.实变函数论与泛函分析[M].北京:经济科学出版社,1990:39-40.
  • 10于善奇.应用统计技术[M].北京:中国标准出版社,2001:267-269.

二级参考文献2

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部