期刊文献+

基于ACK序号步长的LDoS攻击检测方法 被引量:3

Detection method of LDoS attack based on ACK serial number step-length
下载PDF
导出
摘要 低速率拒绝服务(LDoS,low-rate denial of service)攻击具有极强的隐蔽性,对大数据中心和云计算平台构成潜在的安全威胁。在研究LDoS攻击期间网络流量变化的基础上,对数据接收端回传给发送端的ACK数据分组进行统计分析,揭示了其序号步长在LDoS攻击期间具有的波动特征。采用排列熵的方法提取该特征,提出了一种基于ACK序号步长排列熵的LDoS攻击检测方法。该方法通过采集发送端收到的ACK数据分组,对其序号进行采样并计算步长;再利用对时间敏感性较强的排列熵算法检测出步长突变时刻,达到检测LDoS攻击的目的。在实际网络环境中设计和搭建了测试平台并对所提方法进行了验证,实验结果表明,所提方法具有较好的检测性能,取得了较好的检测效果。 Low-rate denial of service(LDoS)attack is a potential security threat to big data centers and cloud computing platforms because of its strong concealment.Based on the analysis of network traffic during the LDoS attack,statistical analysis was given of ACK packets returned by the data receiver to the sender,and result reveals the sequence number step had the characteristics of volatility during the LDoS attack.The permutation entropy method was adopted to extract the characteristics of volatility.Hence,an LDoS attack detection method based on ACK serial number step permutation entropy was proposed.The serial number was sampled and the step length was calculated through collecting the ACK packets that received at the end of sender.Then,the permutation entropy algorithm with strong time-sensitive was used to detect the mutation step time,and achieve the goal of detecting LDoS attack.A test-bed was designed and built in the actual network environment for the purpose of verifying the proposed approach performance.Experimental results show that the proposed approach has better detection performance and has achieved better detection effect.
作者 吴志军 潘卿波 岳猛 WU Zhijun;PAN Qingbo;YUE Meng(School of Electronic Information&Automation,Civil Aviation University of China,Tianjin 300300,China)
出处 《通信学报》 EI CSCD 北大核心 2018年第7期139-147,共9页 Journal on Communications
基金 国家自然基金委员会与中国民航局联合基金资助项目(No.U1533107) 天津市自然基金重点资助项目(No.17JCZDJC30900)~~
关键词 低速率拒绝服务 ACK序号步长 排列熵算法 检测 low-rate denial of service ACK serial number step-length permutation entropy detection
  • 相关文献

参考文献6

二级参考文献84

  • 1孙丽颖,闫钿.应用于信号处理的Fourier变换与小波变换[J].光电技术应用,2005,20(2):47-49. 被引量:1
  • 2侯威,封国林,董文杰,李建平.利用排列熵检测近40年华北地区气温突变的研究[J].物理学报,2006,55(5):2663-2668. 被引量:43
  • 3郝成元,吴绍洪,李双成.排列熵应用于气候复杂性度量[J].地理研究,2007,26(1):46-52. 被引量:27
  • 4余景辉,谢志江.小波奇异性检测在机械故障诊断技术中的应用[J].机械工程师,2007(6):63-65. 被引量:4
  • 5Kuzmanovic A, Knightly EW. Low-Rate TCP-targeted denial of service attacks--the shrew vs. the mice and elephants. In: Proc. of the ACM SIGCOMM 2003. New York: ACM Press, 2003. 75-86. http://byte.csc.lsu.edu/-durresi/7502/reading/p75-kuzmanovic. pdf.
  • 6Sarat S, Terzis A. On the effect of router buffer sizes on low-rate denial of service attacks. In: Proc. of the 14th Int'l Conf. on Computer Communications and Networks (ICCCN 2005). New York: IEEE Press, 200S. 281-286. http://www.cs.jhu.edu/-sarat/ ICCCN05.pdf.
  • 7Kwok YK, Tripathi R, Chen Y, Hwang K. HAWK: Halting anomalies with weighted choking to rescue well-behaved TCP sessions from shrew DDoS attacks. In: Proc. of the 3rd Int'l Conf. on Networking and Mobile Computing (ICCNMC 2005). New York: Springer-Verlag, 2005.423-432. http://gridsec.usc.edu/files/TR/HAWK-ICCNMC2005-CameraReady.pdf.
  • 8Sun H, Lui JCS, Yau DKY. Defending against low-rate TCP attacks: Dynamic detection and protection. In: Proc. of the 12th IEEE Int'l Conf. on Network Protocols (ICNP 2004). New York: IEEE Press, 2004. 196-205. http://www.cse.cuhk.edu.hk/-cslui/ PUBLICATION/icnp_lowrate.pdf.
  • 9Sun H, Lui JCS, Yau DKY. Distributed mechanism in detecting and defending against the low-rate TCP attack. Computer Networks, 2006,50(13):2312-2330.
  • 10Chen Y, Hwang K. Collaborative detection and filtering of shrew DDoS attacks using spectral analysis. Journal of Parallel and Distributed Computing, 2006,66(9): 1137-1151.

共引文献177

同被引文献31

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部