期刊文献+

基于IP熵变量的DDoS攻击溯源模型 被引量:10

DDoS attack source tracing model based on IP entropy variable
下载PDF
导出
摘要 针对当前溯源方法无法识别源于中间路由器的恶意攻击、无法区分攻击流量类型等问题,借鉴热力学中熵的概念并结合IP分布特征,定义IP熵变量,结合通信熵和IP熵提出一个基于熵变量的DDoS攻击溯源模型,设计DDoS攻击识别算法、DDoS攻击溯源算法和DDoS流量区分算法。实验结果表明,该模型在时间容忍范围内提升了溯源效率,降低了僵尸网络检测的漏报率,能够识别出快速DDoS攻击、慢速DDoS攻击及flash crowd等类型,识别率达到了85.71%。 For the current traceability method,the malicious attack originating from the intermediate router cannot be identified,and the type of attack traffic cannot be distinguished.The concept of entropy in thermodynamics was combined with the IP distribution feature to define the IP entropy variable.Based on communication entropy and IP entropy,a DDoS attack source tracing model based on entropy variable was proposed.DDoS attack recognition algorithm,DDoS attack tracing algorithm and DDoS traffic discrimination algorithm were designed.Experimental results show that the proposed model improves the traceability efficiency within the time tolerance,reduces the false negative rate of botnet detection,and it can identify fast DDoS attacks,slow DDoS attacks and flash crowds,and the recognition rate reaches 85.71%.
作者 郭伟 邱菡 周天阳 朱俊虎 GUO Wei;QIU Han;ZHOU Tian-yang;ZHU Jun-hu(Cyberspace Security College,Information Engineering University,Zhengzhou 450001,China;National Digital Switching System Engineering and Technological Research Center,Zhengzhou 450002,China)
出处 《计算机工程与设计》 北大核心 2019年第12期3367-3374,共8页 Computer Engineering and Design
基金 国家自然科学基金项目(61502528)
关键词 香农熵 分布式拒绝服务攻击 攻击溯源 瞬时拥塞 慢速拒绝服务攻击 Shannon entropy distributed denial of service attack attack tracing flash crowd slow DDoS attack
  • 相关文献

参考文献8

二级参考文献73

  • 1陆音,石进,黄皓,谢立.综述:关于IPv6安全性问题的研究[J].计算机科学,2006,33(5):5-11. 被引量:15
  • 2谢逸,余顺争.基于Web用户浏览行为的统计异常检测[J].软件学报,2007,18(4):967-977. 被引量:42
  • 3孙知信,李清东.基于源目的IP地址对数据库的防范DDos攻击策略[J].软件学报,2007,18(10):2613-2623. 被引量:21
  • 4占勇军,谢冬青,周再红,罗莉莉.IPv6下基于改进的SPIE源追踪方案[J].计算机工程与科学,2007,29(4):11-13. 被引量:5
  • 5朱晓建,刘渊,李秀珍.基于非重复包标记的IP追踪研究[J].计算机应用,2007,27(11):2694-2695. 被引量:3
  • 6CONVERY S.网络安全体系结构[M].田果,刘丹宁,译.北京:人民邮电出版社,2013:234-245.
  • 7BASKAR M,GNANASEKARAN T,SARAVANAN S.Adaptive IP traceback mechanism for detecting low rate DDoS attacks[C]//ICE-CCN:Proceedings of the 2013 International Conference on Emerging Trends in Computing,Communication and Nanotechnology.Piscataway:IEEE,2013:373-377.
  • 8FOROUSHANI V A,ZINCIR-HEYWOOD A N.TDFA:traceback-based defense against DDoS flooding attacks[C]//Proceedings of the 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.Piscataway:IEEE,2014:597-604.
  • 9KIREMIRE A R,BRUST M R,PHOHA V V.Topology-dependent performance of attack graph reconstruction in PPM-based IP traceback[C]//Proceedings of the 2014 IEEE 11th Consumer Communications and Networking Conference.Piscataway:IEEE,2014:363-370.
  • 10SAVAGE S,WETHERALL D,KARLIN A,et al.Practical network support for IP traceback[J].ACM SIGCOMM Computer Communication Review,2000,30(4):295-306.

共引文献72

同被引文献95

引证文献10

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部