期刊文献+

采用符号动力学方法检测低速率拒绝服务攻击

Low-rate-denial-of-service attack detection by symbolic dynamics method
下载PDF
导出
摘要 针对低速率拒绝服务攻击引起的网络安全问题,提出采用符号动力学方法对其进行检测,通过将采样得到的数据包数量信号转化为对应的符号序列,并计算符号序列的熵值,发现低速率拒绝服务攻击具有令数据包数量信号信息复杂度激增的特点,从而能够结合预先设定的熵阈值进行比较识别.分别在仿真环境和实际测试服务器上进行了算法验证,实验结果表明,文中所提算法对低速率拒绝服务攻击辨识平均准确度超过92%. In terms of the network security problem caused by Low-rate-Denial-of-Service attack, this paper proposes a symbolic dynamics method to detect such attacks. The number of packets sampled signals is transferred into the symbol sequence and the calculate the entropy corresponding to the symbol sequence. There is a significant increase in packets number signal information complexity caused by Low-rate-Denial- of-Service attack arrival, which can be compared with a default entropy threshold for recognition. We verify the algorithm in the simulation environment and the actual test servers respectively and the experimental results show that the proposed algorithm has an average accuracy of 92% to achieve the Low-rate-Denial-of- Service attack recognition.
作者 杨宝旺
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2018年第1期140-144,共5页 Journal of Xidian University
基金 国家自然科学基金资助项目(61573235)
关键词 低速拒绝服务攻击 符号动力学 信息复杂度 阈值 网络安全 low-rate-denial-of-service attack symbolic dynamics entropy information complexity threshold network security
  • 相关文献

参考文献2

二级参考文献20

  • 1Yu Chen, Yu-Kwong Kwok, Kai Hwang. Collaborative Defense Against Periodic Shrew DDoS Attacks in Frequency Domain [ J ]. Journal of Parallel and Distributed Computing. 2006, 66 (9):1137- 1151.
  • 2M Delio.New breed of attack zombies lurk[R/OL].http://www.acm.org/technews/articles/2001-3/0514m.html.2001-5-1.
  • 3Kuzmanovic A, Knightly E. Low-rate TCP-targeted denial of service attacks [ A ]. Proc ACM SIGCOMM'03 [ C ]. USA: ACM Press 2003.75 - 86.
  • 4Cheng C -M,Kung H, Tan K -S Tan.Use of spectral analysis in defense against DoS attacks[ J ]. Proc IEEE GLOBECOM. 2002,3(75) :2143 - 2148.
  • 5Y-K Kwok, R Tripathi, Y Chen, K Hwang. HAWK: Halting Anomaly with Weighted ChoKing to Rescue Well-Behaved TCP Sessions from Shrew DoS Attacks [ J]. LNCS Computer Networks and Mobile Computing. 2005,3619(47) :423 - 432.
  • 6Chen Y,Hwang K,Kwok YW. Filtering of shrew DDoS attacks in frequency domain[A]. In:Proc of the IEEE Conf. on Local Computer Networks, 30th Anniversary [ C ]. New York: IEEE Inc,2005. 786 - 793.
  • 7Kailath T, Sayed A H, Hassibi B, Sayed A H, Hassibi B.Linear Estimation[M] .NJ:Prentice Hall,2000.
  • 8Soule A, Salamatian K, Taft N. Traffic matrix tracking using kalman filters[ A]. ACM SIGMETRICS Performance Evaluation Review[ C ]. USA: ACM Press, 2005.33 (3) : 24 - 31.
  • 9Soule A, Nucci A, Cruz R, Leonardi E, taft N. How to identify and estimate the largest traffic matrix elements in a dynamic environment[ A]. In ACM Sigmetrics [ C ]. USA: ACM Press, 2004.32(1) :73 - 84.
  • 10C Burrus, R Gopinath, H Guo. Introduction to Wavelets and Wavelet Transforms: A Primer[ M]. NJ: Prentice Hall, 1998: 162 - 213.

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部