期刊文献+

基于流量自相似的DDoS检测分析

DDoS Detection Based on Traffic Self-similarity
下载PDF
导出
摘要 近年来,人们的日常生活与互联网越来越密不可分,网络安全问题也呈现高发态势。作为一种严重的网络威胁,分布式拒绝服务(DDoS)攻击越发为人们所关注。通过对流量的自相似检测,可以实现对DDoS进行有效判定,然而传统算法的固定式判据难以体现现实流量的变化,文章提出一种改进型算法,可实现对DDoS的动态检测。 As a serious threat, Distributed Denial of Service (DDoS) is becoming one of the biggest concerns. The approach based on self-similarity is effective in detecting DDoS. But the original approach doesn't respond to the change of network. Therefore, this paper proposes an improved method which works on real time detection. And experiments show that this method is more effective.
作者 郑明明 梁鸿
出处 《常州工学院学报》 2013年第3期51-54,共4页 Journal of Changzhou Institute of Technology
关键词 分布式拒绝服务 流量自相似 动态检测 DDoS traffic self-similarity dynamic detection
  • 相关文献

参考文献9

  • 1Elliott John. Distributed Denial of Service Attacks and the Zom- bie Ant Effect[J]. IT Prfessional,2000,2(2) :55 -57.
  • 2Computer Security Institute. 14th Annual CSI Computer Crime and Security Survey Executive Summary [ EB/OL ]. (2009 - 12 - 01 ). http ://pathmaker. biz/whitepapers/CSISurvey2009, pdf.
  • 3Douligeris Christos, Mitrokotsa Aikaterini. DDoS Attacks and Defense Mechanisms : Classification and State-of-the-art [ J ]. Computer Networks,2004,44 ( 5 ) : 643 - 666.
  • 4Li Lan, Lee Gyungho. DDoS Attack Detection and Wavelets [ C ]//Computer Communications and Networks, 2003. ICCCN 2003. Proceedings. The 12th International Conference on ,2003 : 421 - 427.
  • 5国家计算机网络应急技术处理协调中心.中国互联网网络安全报告(2008年上半年)[R],北京:2009.
  • 6Stilian Stoev, Murad S Taqqu, Cheolwoo Park, et al. LASS : A Tool for the Local Analysis of Self-similarity[ J]. Computational Statistics & Data Analysis,2006,50 ( 9 ) :2447 - 2471.
  • 7任勋益,王汝传,王海艳,李金明.基于自相似检测DDoS攻击的小波选择[J].南京航空航天大学学报,2007,39(5):588-592. 被引量:8
  • 8Cheng Xiaorong, Xie Kun, Wang Dong. Network Traffic Anom- aly Detection Based on Self-Similarity Using HHT and Wavelet Transform[ C ]//Information Assurance and Security, 2009. IAS '09. Fifth International Conference on ,2009,1:710 - 713.
  • 9任勋益,王汝传,王海艳.基于自相似检测DDoS攻击的小波分析方法[J].通信学报,2006,27(5):6-11. 被引量:56

二级参考文献19

  • 1孙钦东,张德运,高鹏.基于时间序列分析的分布式拒绝服务攻击检测[J].计算机学报,2005,28(5):767-773. 被引量:55
  • 2任勋益,王汝传,王海艳.基于自相似检测DDoS攻击的小波分析方法[J].通信学报,2006,27(5):6-11. 被引量:56
  • 3CHANG R K C.Defending against flooding-based distributed denial-of-service attack:a tutorial[J].IEEE Comm Magazine,2002,40(10):42-51.
  • 4LAU F,RUBIN S H,SMITH M H.Distributed denial of service attacks[A].Proceedings of the IEEE International Conference on Systems,Man,and Cybernetics[C].Nashville,2000.2275-2280.
  • 5LELAND W,TAQQU M,WILLINGER W.On the self-similar nature of Ethernet traffic (Extended Version)[J].IEEE/ACM Trans on Networking,1994,2(1):1-15.
  • 6PAXSON V,FLOYD S.Wide area traffic:the failure of poisson modeling[J].IEEE/ACM Trans on Networking,1995,3(3):226-244.
  • 7DANG T D,MOLNAR S.On the Effects of Non-Staionarity in Long Range Dependent Tests[R].Budapest Univ Technology and Economics Tech Rep,Budapest,Hungary,1999.
  • 8ABRY P,VEITCH D.Wavelet analysis of long range dependent traffic[J].IEEE Trans on Infor Theory,1998,44(1):2-15.
  • 9李弻程,罗建书.小波分析及其应用[M].北京:电子工业出版社,2003.
  • 10DAUBECHIES I.Ten Lectures on Wavelets[M].Philadelphia,PA:SIAM,1992.

共引文献59

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部