期刊文献+

抵御模仿人类行为DDoS的软件防火墙

Software Firewall Against DDoS Mimicking Human Behavior
下载PDF
导出
摘要 模仿人类行为的HTTP洪水是一种分布式拒绝服务攻击.提出一种抵御方法,它包括三个关键点:使用会话号标示请求者身份,通过分析单位时间的请求消息序列发现傀儡主机,通过丢弃或修改傀儡主机的请求消息中断其攻击.基于该方法实现了一种软件防火墙,它包括统计模块和转发模块,统计模块用于发现傀儡主机,转发模块用于丢弃或修改傀儡主机的请求消息.防火墙部署在网站服务器上,管理员根据网站特征设置运行参数,能以较小的代价使服务器从HTTP洪水中脱困. HTTP floods mimicking the human behavior is kind of distributed denial of service attack. This paper presents a resist method, it includes three key points, uses session 1D to identify users, discovers the puppet computer by analyzing the request sequence in unit time, interrupts the attacks by discarding or modifying the request message. A sottware firewall is implemented based on this method, it includes a statistics module and a forwarding module. The statistics module is used to discover the puppet computers. The forwarding module is used to discard or modify the request messages of puppet computers. The firewall is deployed on a web server, the administrator sets the running arguments according to the site characteristics, help rescuing the server from HTTP floods at a low cost.
作者 袁志
出处 《计算机系统应用》 2015年第4期148-152,共5页 Computer Systems & Applications
关键词 网站安全 HTTP洪水 分布式拒绝访问攻击 用户识别 防火墙 Website security HTTP Floods distributed denial of service user identification fire wall
  • 相关文献

参考文献6

二级参考文献57

  • 1方成效,袁可风.Web日志挖掘的数据预处理研究[J].计算机与现代化,2006(4):79-81. 被引量:12
  • 2孙知信,李清东.路由器端防范DDos攻击机制综述[J].南京邮电大学学报(自然科学版),2007,27(1):89-96. 被引量:8
  • 3李金明,王汝传.基于VTP方法的DDoS攻击实时检测技术研究[J].电子学报,2007,35(4):791-796. 被引量:18
  • 4Worldwide Infrastructure Security Report,Volume Ⅲ[OL].Arbor Networks,http://www.arbornetworks.com/report,September 2007.
  • 5Dittrich D.Distributed Denial of Service(DDoS) Attacks/tools[OL].http://staff.washington.edu/dittricb/misc/ddos/.
  • 6Kargl F,Maier J,Weber M.Protecting web servers from distributed denial of service attacks[A].In Proc.International Conference on World Wide Web[C].2001.
  • 7Hussain A,Heidemann J,Papadopoulos C.A framework for classifying denial of service attacks[A].In Proc.ACM SIGCOMM[C].2003.
  • 8Mirkovic J,Reiher P.A taxonomy of DDoS attack and DDoS defense mechanisms[J].ACM SIGCOMM Computer Communications Review.2004,34(2):39-53.
  • 9Carl G,Kesidis G,Brooks R R,et al.Denial-of-service attackdetection techniques[J].IEEE Internet Computing.2006,10(1):82-89.
  • 10Peng T,Leckie C,Ramamohanarao K.Survey of network-based defense mechanisms countering the DoS and DDoS problems[J].ACM Computing Surveys.2007,39(1).

共引文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部