期刊文献+

一种检测降质服务攻击的方法

A Method for Detecting Degradation of Service Attacks
下载PDF
导出
摘要 当今的网络攻击事件时有发生,攻击者频频能够得逞的原因有两个,一是网络软件存在漏洞;二是日常使用的网络通讯协议未能充分考虑其安全性。降质服务攻击就是一种利用网络协议存在的安全漏洞,发送大量的数据包来达到攻击网络的目的。因此基于上述原因论文从单位时间内数据包数量变化的角度来检测是否存在有网络黑客在攻击网络。MMTD算法是一种源于中介思想的算法,论文将MMTD算法在检测网络攻击行为的方面进行应用是论文的创新点。 In today's network attacks have occurred from time to time,there are two reasons why the attacker can be succeed,one is the existence of loopholes in the network software.the other is the network communication protocol for daily use has not fully considered the safety.Degradation of service attacks security vulnerabilities exist is a use of the network protocol,data packets sent a large number of network attacks to achieve.So the above reasons based on the unit of time the number of data packets in terms of changes to detect the presence of a network hacker attacks,network.The MMTD algorithm is an algorithm derived from the intermediary idea,in this paper,MMTD algorithm is used in the detection of network attacks is the innovation point of this paper.
作者 朱俚治
出处 《计算机与数字工程》 2016年第1期73-75,105,共4页 Computer & Digital Engineering
基金 北京航空航天大学软件开发环境国家重点实验室开放基金项目(编号:SKLSDE-2013KF-02)资助
关键词 MMTD 降质服务攻击 数据包 MMTD reduced quality of service packet attack
  • 相关文献

参考文献9

二级参考文献63

  • 1Kuzmanovic A, Knightly EW. Low-Rate TCP-targeted denial of service attacks--the shrew vs. the mice and elephants. In: Proc. of the ACM SIGCOMM 2003. New York: ACM Press, 2003. 75-86. http://byte.csc.lsu.edu/-durresi/7502/reading/p75-kuzmanovic. pdf.
  • 2Sarat S, Terzis A. On the effect of router buffer sizes on low-rate denial of service attacks. In: Proc. of the 14th Int'l Conf. on Computer Communications and Networks (ICCCN 2005). New York: IEEE Press, 200S. 281-286. http://www.cs.jhu.edu/-sarat/ ICCCN05.pdf.
  • 3Kwok YK, Tripathi R, Chen Y, Hwang K. HAWK: Halting anomalies with weighted choking to rescue well-behaved TCP sessions from shrew DDoS attacks. In: Proc. of the 3rd Int'l Conf. on Networking and Mobile Computing (ICCNMC 2005). New York: Springer-Verlag, 2005.423-432. http://gridsec.usc.edu/files/TR/HAWK-ICCNMC2005-CameraReady.pdf.
  • 4Sun H, Lui JCS, Yau DKY. Defending against low-rate TCP attacks: Dynamic detection and protection. In: Proc. of the 12th IEEE Int'l Conf. on Network Protocols (ICNP 2004). New York: IEEE Press, 2004. 196-205. http://www.cse.cuhk.edu.hk/-cslui/ PUBLICATION/icnp_lowrate.pdf.
  • 5Sun H, Lui JCS, Yau DKY. Distributed mechanism in detecting and defending against the low-rate TCP attack. Computer Networks, 2006,50(13):2312-2330.
  • 6Chen Y, Hwang K. Collaborative detection and filtering of shrew DDoS attacks using spectral analysis. Journal of Parallel and Distributed Computing, 2006,66(9): 1137-1151.
  • 7Guirguis M, Bestavros A, Matta I. Exploiting the transients of adaptation for RoQ attacks on Internet resources. In: Proc. of the 12th IEEE Int'l Conf. on Network Protocols (ICN-P 2004). New York: IEEE Press, 2004. 184-195. http://www.ieee-icnp.org/ 2004/papers/5-2.pdf.
  • 8Luo XP, Chang RKC. On a new class of pulsing denial-of-service attacks and the dcfanse, In: Proc. of the Network and Distributed System Security Symp. (NDSS 2005). Rcston: Intcrnct Society, 2005. http://www.isoc.org/isoc/confercnces/ndss/OS/proccedings/ papers/new_pulsing_DOS.pdf.
  • 9Chertov R, Fahmy S, Shroff NB. Emulation versus simulation: A case study of TCP-targeted denial of service attack. In: Proc. of the 2nd IEEE Conf. on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2006). New York: IEEE Press, 2006. http://cobweb.ecn.purdue.edu/-shroff/Shroff/conference/CheFahShr-tridentcom.pdf.
  • 10Chen Y, Hwang K. Spectral analysis of TCP flows for defense against reduction-of-quality attacks. In: Proc. of the 2007 IEEE Int'l Conf. on Communications (ICC 2007). New York: IEEE Press, 2005. 1203-1210. http://pods.binghamton.edu/-ychenfPID364015. pdf.

共引文献125

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部