期刊文献+

SIPDDoS分布式入侵防御系统及其负载均衡策略

Distributed Intrusion Prevention System for SIP DDoS Attack
下载PDF
导出
摘要 对SIP DDoS攻击的原理和检测算法进行研究,结合SIP协议本身的特点和一般网络中的分布式入侵防御系统,提出一种在高效防御SIP DDoS攻击的同时使用检测算法检测攻击的分布式防御系统,并为该系统设计了负载交互流程和防火墙模块.根据SIP负载均衡算法和检测算法的要求,为分布式防御系统设计了两级负载均衡策略并给出了实现方法,其中一级负载均衡模块根据SIP消息的头域进行转发,保证对话的完整性和检测算法的要求;二级负载均衡模块根据防御检测节点负载进行转发,保证防御检测节点的负载均衡特性.仿真实验结果表明系统的两级负载均衡算法能够在保证检测算法要求的前提下表现出良好的负载均衡特性. This paper studies the theory of SIP DDoS attack, detection algorithms and the characters of SIP protocol itself. Combined with the distributed intrusion prevention systems in general network, a highly efficient distributed prevention system is proposed and the load interaction process and f'trewall module for the system are designed. The system can detect SIP DDoS attack with detecting al- gorithms while defending attack at the same time. According to the SIP load balance algorithms and the requirements of detection al- gorithms, a two level load balance strategy for the system is designed. The first level load balance module distributes messages according to the head fields of the messages to keep the integrity of dialog and meet the requirements of detecting algorithms. The sec- ond level lord balance module distributes messages according to the load of defending and detecting nodes to keep the load balance of these nodes. The simulation results show that the two level load balance strategy of the system can meet the requirements of detection algorithms and make a good performance of load-balancing features.
出处 《小型微型计算机系统》 CSCD 北大核心 2013年第9期2095-2099,共5页 Journal of Chinese Computer Systems
基金 国家重大专项水专项基金项目(2009ZX07528-006-05)资助
关键词 会话初始化协议 分布式拒绝服务攻击 分布式防御 检测算法 负载均衡 SIP DDoS distributed intrusion prevention detecting algorithm load balance
  • 相关文献

参考文献2

二级参考文献26

  • 1索望,方勇,王昆.SIP协议中的安全机制[J].信息网络安全,2004(10):32-35. 被引量:8
  • 2储泰山,潘雪增.SIP安全模型研究及实现[J].计算机应用与软件,2004,21(12):101-104. 被引量:15
  • 3司端锋,韩心慧,龙勤,潘爱民.SIP标准中的核心技术与研究进展[J].软件学报,2005,16(2):239-250. 被引量:96
  • 4郭力,王时龙,张腾.基于SIP通信的安全性研究[J].信息安全与通信保密,2005,27(11):55-58. 被引量:8
  • 5TZVETKOV V, ZULEGER H. Service provider implementation of SIP regarding security[A]. Proceedings of the 21st International Conference Advanced Information Networking and Applications Workshops[C]. Washington, DC, USA, 2007.30-35.
  • 6GENEIATAKIS D, DAGIUKLAS T, LAMBRINOUDAKIS C, et al. Novel protecting mechanism for sip-based infrastructure against malformed message attacks: performance evaluation study[A]. Proc of the 5th International Conference on Communication Systems, Networks and Digital Signal Processing (CSNDSP'06)[C]. Patras, Greece, 2006. 261-270.
  • 7ZHANG R S, WANG X Y, YANG X H, et al. Billing attacks on SIP-based VolP systems[A]. Proceedings of the First Conference First USENIX Workshop on Offensive Technologies[C]. Boston, MA, 2007.4-4.
  • 8BILIEN J, ERIK E, JOACHIM O. Secure VoIP: Call Establishment and Media Protection[R]. KTH, Royal Institute of Technology, Stockholm, 2005.
  • 9MAHAJAN R, BELLOVIN S, FLOYD S, et al. Controlling high bandwidth aggregates in the network[J]. ACM SIGCOMM CCR, 2002, 32(3):62-73.
  • 10WANG H N, ZHANG D L, KANG G S. Detecting SYN flooding attacks[J]. IEEE Computer and Communication Society, 2002,3(6): 1530-1539.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部