期刊文献+

网络空间作战中利用强化学习方法防御放大式拒绝服务攻击 被引量:3

Using Reinforcement Learning Method to Defense Amplification DDoS Attack in Cyberspace Operations
下载PDF
导出
摘要 为解决放大式拒绝服务攻击给赛博安全带来的风险,提出一种基于强化学习的方法。以DNS的放大攻击为对象,构建一个简化的放大攻击模型,利用model-free方法获取不同状态间的转移概率,采用强化学习方法建立防御放大攻击模型,通过对放大攻击模式的学习制定流量抑制策略,并对其进行仿真实验验证。结果表明:该方法能够有效挖掘出放大攻击的流量模式,智能化抵御来自放大攻击的威胁。 To resist the risk of amplification DDoS attack,which is likely to cause significant damage to cyber security,a reinforcement learning method is proposed.Taking DNS as the target of attack,a simplified amplification attack model is constructed.The transition probability between different states is obtained by using the model-free method.Then,the reinforcement learning method is used to build up to defense the attack,and the traffic suppression strategy is formulated by learning the amplification attack mode.Finally,the simulation results show that the proposed reinforcement learning method can effectively dig out the traffic pattern of amplification DDoS attack and intelligently resist the threat.
作者 陈泱 李卓禹 闫海港 张元天 Chen Yang;Li Zhuoyu;Yan Haigang;Zhang Yuantian(Naval Research Academy,Beijing 100161,China;Science&Technology on Complex Ship Systems Simulation Laboratory,Beijing 100161,China;Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100091,China)
出处 《兵工自动化》 2021年第1期8-12,共5页 Ordnance Industry Automation
关键词 网络空间作战 赛博安全 强化学习 放大式拒绝服务攻击 cyberspace operations cyber security reinforcement learning amplification DDoS attack
  • 相关文献

参考文献3

二级参考文献10

  • 1王帅,金华敏,沈军.超宽带网络安全体系及关键技术研究[J].电信科学,2013,29(S1):257-261. 被引量:1
  • 2[2]Randal Vaughn,Gadi Evron.DNS amplification attacks[EB/OL].http://www.isotf.org/news/DNS-Amplification-Attacks.pdf,2006-03-17.
  • 3[3]ICANN.Root Server Attack on 6 February 2007[EB/OL].http:// www.icann.org/announcements/faetsheet-dns-attack-08mar07.pdf,2007-03.
  • 4[4]Eastlake D.Domain name system security extensions[S].RFC2535,IETF,1999-03.
  • 5[5]The Measurement Factory.Domain name servers:Pervasive and critical,yet often overlooked[EB/OL],http://dns.measurement-factory.com/surveys/suml.html,2006-06-14.
  • 6[7]Athins D.Threat analysis of the domain name system[EB/OL].http://www.ietf.org/interne t-drafts/draft-ietf-dnsext-dns-threats-01,2002.
  • 7[8]Verisign.Anatomy of recent DNS reflector attacks from the vic-tim and reflector point of view[EB/OL].http://www.verisign.com/static/037903.pdf,2006-06-14.
  • 8CHRISTIAN R. Amplification Hell: Revisiting Network Protocols for DDoS Abuse [C]// Network and Distributed System Security Symposium, San Diego, California, 2014.
  • 9关于警惕近期多发NTP反射放大攻击的预警通报[EB/OL]http://wwwcertorgcn/publish/main/8/2014/20140314085001237248948/20140314085001237248948-.htmI.
  • 10贺龙涛,方滨兴,胡铭曾.主动监听中协议欺骗的研究[J].通信学报,2003,24(11):146-152. 被引量:22

共引文献12

同被引文献20

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部