期刊文献+

DDoS攻击检测和控制方法 被引量:117

DDoS Attacks Detection and Control Mechanisms
下载PDF
导出
摘要 分布式拒绝服务(distributed denial of service,简称DDoS)攻击是当今互联网的重要威胁之一.基于攻击包所处网络层次,将DDoS攻击分为网络层DDoS攻击和应用层DDoS攻击,介绍了两类攻击的各种检测和控制方法,比较了处于不同部署位置控制方法的优劣.最后分析了现有检测和控制方法应对DDoS攻击的不足,并提出了DDoS过滤系统的未来发展趋势和相关技术难点. The Distributed denial of service (DDoS) attack is a major threat to the current network. Based on the attack packet level, the study divides DDoS attacks into network-level DDoS attacks and application-level DDoS attacks. Next, the study analyzes the detection and control methods of these two kinds of DDoS attacks in detail, and it also analyzes the drawbacks of different control methods implemented in different network positions. Finally, the study analyzes the drawbacks of the current detection and control methods, the development trend of the DDoS filter system, and corresponding technological challenges are also proposed.
出处 《软件学报》 EI CSCD 北大核心 2012年第8期2058-2072,共15页 Journal of Software
基金 国家自然科学基金(61070185) 国家高技术研究发展计划(863)(2007AA010501 2009AA01Z431)
关键词 DDOS 检测 控制 DDoS detection control
  • 相关文献

参考文献6

二级参考文献58

  • 1MyDoom virus[online].http://www.us-cert.gov/cas/techalerts/ta04-028a.html.
  • 2Chen X,Heidemann J.Flash crowd mitigation via adaptive admission control based on application-level observations.ACM Transactions on Internet Technology,2005,5(3):532-569.
  • 3Jung J,Krishnamurthy B,Rabinovich M.Flash crowds and denial of service attacks:Characterization and implications for CDNs and web sites//Proceedings of the 11th IEEE International World Wide Web Conference.Honolulu,Hawaii,USA,ACM,2002:252-262.
  • 4Xie Y,Yu S.Monitoring the application-layer DDoS attacks for popular websites.IEEE/ACM Transactions on Networking,2009,17(1):15-25.
  • 5Li K,Zhou W,Li P,Hai J,Liu J.Distinguishing DDoS attacks from flash Crowds using probability metrics//Proceedings of the 3rd International Conference on Network and System Security.Gold Coast,Queensland,Australia,2009:9-17.
  • 6Yu S,Thapngam T,Liu J,Wei S,Zhou W.Discriminating DDoS flows from flash crowds using information distance//Proceedings of the 3rd International Conference on Network and System Security.Gold Coast,Queensland,Australia,2009:351-356.
  • 7Oikonomou G,Mirkovic J.Modeling human behavior of defense against flash-crowd attacks//Proceedings of the IEEE International Conference on Communications.Dresden,Germany,2009:14-18.
  • 8Park K,Pai V,Lee K,Calo S.Securing Web service by automatic robot detection//Proceedings of the Annual Conference on USENIX'06 Annual Technical Conference.Boston,USA,2006:23-28.
  • 9Ranjan S,Swaminathan R,Uysal M,Knightly E.DDoS-Shield:DDoS-resilient scheduling to counter application layer attacks.IEEE/ACM Transactions on Networking,2009,17(1):26-39.
  • 10Kandula S,Katabi D,Jacob M,Berger A.Botz-4-scale:Surviving organized DDoS attacks that mimic flash crowds//Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation.Kyoto,Japan,2005:287-300.

共引文献63

同被引文献608

引证文献117

二级引证文献359

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部