期刊文献+

一种基于熵检测的DNS64分布式拒绝服务攻击检测方法

A Novel DNS64 DDoS Attack Dectection Method Based on Entropy Estimation
下载PDF
导出
摘要 针对DNS64分布式拒绝服务攻击的具体场景,提出了一种基于信息熵估计的异常流量检测技术,该技术采用了统计阈值而非固定阈值的攻击检测方式,并结合DNS64协议特点,针对性地引入了多攻击特征加权判别机制。实验与分析结果表明,上述方法能够针对渐增的DDoS攻击行为给予及时响应,同时在保障DDoS攻击检测率的同时,有效地降低其检测误报率,从而达到DNS64攻击识别与服务防护的目的。 During the IPv4/v6 transition period, it's essential to ensure the security and reliability of the DNS64 infrastructures,and keep it away from the popular DdoS attacks. An novel DNS64 DDoS anomaly dectection algorithm based on entropy estimation is proposed in this paper. By considering the characteristic of DNS64 scenario, we adopt an improved statistical threshold method, and we also introduce a weighted discrimination mechanism based on multiple attack features. Test and experiments show that the detection accuracy of DDoS is greatly improved by our method, and the efficiency for dectections is also guaranteed.
作者 王亚兵
出处 《电脑知识与技术》 2014年第7X期4990-4993,共4页 Computer Knowledge and Technology
关键词 IPV6 DNS64 并存过渡机制 DDOS 熵检测 IPv6 DNS64 IPv4/v6 transition DDoS Entropy Estimation
  • 相关文献

参考文献3

二级参考文献28

  • 1MEHTA M,THAPAR K,OIKONOMOU G,et al.Combining speak-up with DefCOM for improved DDoS defense[C] // IEEE International Conference on Communications.New York:IEEE,2008:1708-1714.
  • 2SUN HUIZHONG,ZHAUNG Y,CHAO J H.A principal components analysis-based robust DDoS defense system[C] // IEEE International Conference on Communications,New York:IEEE,2008:1663-1669.
  • 3SUL W T,LIN T C,WU C Y,et al.An on-line DDoS attack traceback and mitigation system based on network performance monitoring[C] // Proceedings of 10th International Conference on Advanced Communication Technology.New York:IEEE,2008:1467-1472.
  • 4CHEN YU,HWANG K,KU W S.Collaborative detection of DDoS attacks over multiple network domains[J].IEEE Transactions on Parallel and Distributed Systems,2007,18(12):1649-1662.
  • 5KHOR S N.Overfort:Combating DDoS with peer-to-peer DDoS puzzle[C] // IEEE International Symposium on Parallel and Distributed Processing.New York:IEEE,2008:1-8.
  • 6KUMAR K,JOSHI R C,SINGH K.A distributed approach using entropy to detect DDoS attack[C] // International Conference on Communications and Networking.New York:IEEE,2007:331-337.
  • 7SARDANA A,JOSHI R C,KIM T H.Deciding optimal entropic thresholds to calibrate the detection mechanism for variable rate DDoS attacks in ISP domain[C] // Proceedings of the 2008 International Conference on Information Security and Assurance.Washington,DC:IEEE Computer Society,2008:270-275.
  • 8YU SHUI,ZHOU WANLEI.Entropy-based collaborative detection of DDoS attacks on community networks[C] // Proceedings of the 2008 6th Annual IEEE International Conference on Pervasive Computing and Communications.Washington,DC:IEEE Computer Society,2008:566-571.
  • 9YU SHUI,ZHOU WANLEI.Information theory based detection against network behavior mimicking DDoS attacks[J].Communications Letters,2008,12(4):318-321.
  • 10SARDANA A,KUMAR K,JOSHI R C.Detection and honeypot based redirection to counter DDoS attacks in ISP domain[C] // Proceedings of 3rd International Symposium on Information Assurance and Security.Washington,DC:IEEE Computer Society,2007:191-196.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部