期刊文献+

DDoS攻击协同防护技术研究与应用

Study and application on cooperative protection technology of DDoS attack
下载PDF
导出
摘要 阐述了DDoS攻击的特征与危害,进一步分析现有的处置技术的优缺点,明确DDoS攻击联动处置的必要性。分析联动处置中面临的困难点,并结合运营商的网络特点提出一种抗DDoS联动处置平台的实现方案。该方案可实现不同DDoS攻击检测与清洗设备的接入、跨设备进行统一检测与清洗;实现单点发现、全网防护与清洗的能力。经试验证明,采用该技术能进一步有效降低网络中30%的异常流量,有效保障网络与用户的安全。 This paper described the characteristics and hazards of DDoS attacks,analyzed advantages and disadvantages of the existing techniques,and then illustrated the necessity of linkage disposal technology in antiDDoSattacks.This paper analyzed the key points in the linkage disposal,and puts forward a scheme of anti DDoS linkage disposal platform based on the network characteristics of the operators.The platform can join different anti DDoS device,including detection device and cleaning device.Furthermore,the platform realized the uniform detection and cleaning of cross devices.While single point detected attack,all the cleaning devices can do uniform flow cleaning.The experimental results show that this technology can reduce about30%anomaly network traffic more,thus effectively protect the security of the network and users.
作者 粟栗 王庆栋 彭晋 陈美玲 SULi;WANGQingdong;PENGJin;CHENMeiling
出处 《电信网技术》 2017年第4期5-10,共6页 Telecommunications Network Technology
关键词 DDOS 联动 流量清洗 DDoS linkage disposal flow cleaning
  • 相关文献

参考文献4

二级参考文献21

  • 1盖凌云,黄树来.分布式拒绝服务攻击及防御机制研究[J].通信技术,2007,40(6):40-41. 被引量:6
  • 2吴华光,甘燕玲.TCP SYN Flood攻击的原理与防范[J].南方金属,2005(1):19-22. 被引量:4
  • 3Porras P A,Neumann P G.EMERALD,Event monitoring enabling responses to anomalous live disturbances//Proceedings of the 12th National Computer Information Systems Security Conference.Baltimore,Maryland,USA,1997:353-365.
  • 4Asaka M,Taguchi A,Goto S.The implementation of IDA:An intrusion detection agent system//Proceedings of the 11th Annual FIRST Conference 1999.Brisbane,AU,1999:146-160.
  • 5Cuppens F.Cooperative intrusion detection//International Symposium on Information Superiority:Tools for Crisis and Conflict-Management.Paris,France,2001,262-274.
  • 6Cuppens F.Managing alerts in a multi-intrusion detection environment//Proceedings of the 17th Annual Computer Security Applications Conference.New Orleans,USA,2001:22.
  • 7Renaud Bidou.Security operation center concepts & implementation,http://www.iv2-technologies,com/~ rbidou/SOC Concept And Implementation.pdf,August 1,2005.
  • 8Dagon D,Zou C,Lee W.Modeling bother propagation using time zones//Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS 2006).San Diego,CA,2006s 235-249.
  • 9Sipser M.Introduction to the Theory of Computation.2nd Edition.Boston MA USA,Course Technology,1997.
  • 10Turing A M.On computable numbers,with an application to the Entscheidungsproblem.Proceedings of the London Mathematical Society,1936,42(2):230-265.

共引文献51

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部