期刊文献+

基于聚类算法的DNS攻击检测

DNS attack detection based on clustering algorithm
下载PDF
导出
摘要 DNS是Internet应用基础,通过DNS映射主机名和IP地址信息来保证两者间正常解析,但DNS设计有先天缺陷,使得其成为被网络攻击的首要对象。为了研究DNS攻击检测方法,从网络遭受DNS攻击的特性等方面分析,提出将捕获到的数据包进行过滤,并将过滤后数据信息通过K-means聚类算法分为不同类别,再用相应算法判定该类数据是否为DNS攻击。 DNS is the basis of Intemet application. In order to ensure the normal parsing information between the hostname and IP address, the DNS using mapping methods. But DNS makes it the primary object of network attack because of its birth defects. In order to study the DNS attack detection methods, the article analyzes the characteristics of DNS attack from networks, proposes to filter the captured data packets, and divide these data into different categories by using K-means methods, and then whether the data is DNS attack is determined by the corresponding algorithm.
作者 李建
机构地区 山西传媒学院
出处 《计算机时代》 2016年第7期31-33,共3页 Computer Era
关键词 DNS攻击 过滤 聚类 K-MEANS算法 DNS attack filter clustering K-means algorithm
  • 相关文献

参考文献6

  • 1中关村在线.百度域名劫持案堂唤落定[DB/OL].http://digi.tech.qq.COnl/a/20101208/000768.htm,2010-12-08.
  • 2腾讯科技.全国范围网络故障事件一览:DNS遭多次攻击[DB/OL].http://tech.qq.com/a/20140121/020779.htm,2014-01-24.
  • 3Pappas V, Xu Z. Impact of configuration errors on DNS robustness. In: Proc. of the ACM SIGCOM,2004: 319-330.
  • 4Fetzer C, Pfeifer G, Jim T. Enhancing DNS Security using the SSL Trust Infrastructure, In: 10th IEEE International Workshop on Object-oriented Real-time Dependable Systems (WORDS 2005),2005:21-28.
  • 5张显,黎文伟.基于多核平台的数据包捕获方法性能评估[J].计算机应用研究,2011,28(7):2632-2634. 被引量:8
  • 6刘小威,陈蜀宇,卢尧,林铭炜.零拷贝技术在网络分析工具中的应用[J].计算机系统应用,2012,21(4):169-173. 被引量:6

二级参考文献16

  • 1王佰玲,方滨兴,云晓春.零拷贝报文捕获平台的研究与实现[J].计算机学报,2005,28(1):46-52. 被引量:67
  • 2DONNELLY S, LIMITED P. DAG packet capture performance [ S ]. 2006.
  • 3Libpcap [ EB/OL ]. http ://www. tcpdump, org.
  • 4WOOD Phil. Libpcap-mmap, Los Alamos National Labs[ EB/OL]. (2009-11-28 ). http ://public. lanl. gov/cpw/.
  • 5DERI L, NETIKOS S P A. Passively monitoring networks at gigabit speeds using commodity hardware and open source software [ EB/ OL]. 2003. http://www, nlanr, net/PAM2003/PAM2003papers/ 3775. pdf.
  • 6DERI L. Improving passive packet capture: beyond device polling [ C ]//Proc of SANE. 2004.
  • 7DERI L, FRANCESCO F. Exploiting commodity multi-core systems for natwork traffic analysis [ R/OL]. 2009. http://luca, ntop. org/MulticorePacketCapture, pdf.
  • 8HEYDE A A. Investigating the performance of endace DAG monitoring hardware and Intel NICs in the context of lawful interception[ R ]. [ S. 1. ] :Centre for Advanced Intemet Architectures,2008.
  • 9Deri L.Improving Passive Packet Capture:Beyond DevicePolling.Proc.of SANE.2004.
  • 10Rubini A,Corbet J.Linux Device Drivers.3rd ed.Sebastopol:O’Reiliy,2005.

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部