期刊文献+

抗IP分片逃避技术的设计与实现 被引量:1

Design and implementation of an anti-IP fragmentation-evasion technique
下载PDF
导出
摘要 通过对目前NIDS的检测技术、IP分片形成以及重组机制的分析,发现常用的NIDS的检测方法不能很好地检测包含在IP分片中的攻击特征,这是由于不同的系统对于分片的处理策略是不同的,不能根据NIDS的处理结果推断终端主机的处理结果,从而包含攻击特征的IP分片可以轻松地逃避NIDS的检测。为此,提出了一种针对于抵抗IP分片攻击的方法,通过在NIDS的前端串行地加入一个流量预处理引擎TPE,对IP分片进行预定的规则处理。实验结果表明,此种方法能够有效地抵御90%以上的IP分片攻击。 Analyzing the detection technology of current NIDS,and the mechanism of formation and reassembly of IP fragmentations,we find that the conventional NIDS detection methods can't detect the attack signatures contained in IP fragmentation very well,which is due to different fragmentation treatment strategies of different systems. Besides,the results of end hosts can't be deduced from the results of NIDS,so the inconsistent behaviors between NIDS and end hosts,which means there may exist attack signatures in IP fragmentation, can easily evade NIDS detection. Therefore, we propose an anti-IP fragmentation-evasion method by adding a TPE in the front of NIDS by serial method, which presets rules for IP fragmentation. Experimental results show that our method can effectively resist the IP fragmentation attack by about 90%.
出处 《计算机工程与科学》 CSCD 北大核心 2015年第2期213-218,共6页 Computer Engineering & Science
基金 国家自然科学基金资助项目(61303264) 国家863计划资助项目(2012AA013002)
关键词 NIDS IP分片重组 IP分片 逃避 流量预处理引擎 NIDS IP fragmentation reassemble IP fragmentation evasion Traffic Preproeess Engine
  • 相关文献

参考文献2

二级参考文献35

  • 1Chang F,Feng W C et al.Efficient packet classification with digest caches//Proceedings of the HPCA NP3 Workshop.Madrid,Spain,2004:13-24.
  • 2Lakshman T V,Stidialis D.High-speed policy-based packet forwarding using efficient multi-dimensional range matching//Proceedings of the ACM SIC,COMM.Vancouver,Canada,1998:203-214.
  • 3Tung Y,Che H.A flow caching mechanism for fast packet forwarding.Computer Communications,2002,25(14):1257-1262.
  • 4Hash Functions for Hash Table Lookup.1997,from:http://www.burtleburtle.net/bob/hash/evahash,html.
  • 5Dharmapurikar S,Paxson V.Robust TCP stream reassembly in the presence of adversaries//Proceedings of the USENIX Security Symposium.Berkeley,CA,2005.
  • 6Barakat C,Thiran P et al.Modeling Internet backbone traffic at the flow level.IEEE Transactions on Signal Processing,2003,51(8):2111-2124.
  • 7Guo F L,Chiueh T.Traffic analysis:From stateful firewall to network intrusion detection system.Stony Brook University,Technical Report TR-164,2004.
  • 8Cranor C,Johnson T et al.Gigascope:A stream database for network applications//Proceedings of the ACM SIGMOD.San Diego,CA,2003:647-651.
  • 9Dreger H,Feldmann A et al.Dynamic application-layer protocol analysis for network intrusion detection//Proceedings of the 15th USENIX Security Symposium.Vancouver,B.C.,Canada,2006:257-272.
  • 10Claffy K,Braun H,Polyzos G.A parameterizable methodology for Internet traffic flow profiling.IEEE Journal on Selected Areas in Communications,1995,13(8):1481-1494.

共引文献4

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部