期刊文献+

基于路由器代理的分布式湮没检测系统 被引量:8

A Router-Agent-Based Distributed Flooding Detection System
下载PDF
导出
摘要 TCP同步湮没是最常见也是最重要的拒绝服务攻击 ,研究其防范措施对保障网络安全具有重要意义 .为弥补状态检测防火墙和基于服务器方案等传统对策的不足 ,湮没检测系统FDS在叶节点路由器上监控TCP控制分组 ,根据“SYN FIN匹配对”协议特性对本地统计信息进行分析以检测攻击 .为保护大规模网络 ,该文将基于代理的分布式入侵检测理论与湮没攻击检测结合 ,给出了面向硬件的简化系统SFDS .以SFDS作为集成在路由器网络接口的检测代理 ,提出了一种高性能的分布式湮没检测系统并论述了其全局判决机理 . TCP SYN flood is one of the most common and most important denial of service attacks. Research against SYN flood is of great value to network security. Traditional countermeasures such as stateful inspection firewalls and other server-based solutions have been proved limited and not very efficient. We present a novel approach based on the Flooding Detection System (FDS), which is installed at the leaf routers. Based on the protocol behavior of TCP SYN-FIN pairs, the FDS detects attacks by monitoring TCP control packets and analyzing the local statistical information. To protect large scale network, we first associate the agent-based distributed intrusion detection with detecting SYN flood attacks. A Simplified Flooding Detection System (SFDS) is then proposed and its algorithm is proved to be hardware-oriented. By integrating the SFDSs as detection agents into network interfaces of the routers, we propose a high-performance distributed flooding detection system and its global decision mechanism is illustrated.
出处 《计算机学报》 EI CSCD 北大核心 2003年第11期1585-1590,共6页 Chinese Journal of Computers
基金 国家自然科学基金项目"面向大规模网络的分布式入侵检测和预警模型"资助 ( 90 10 40 3 0 )
关键词 分布式湮没检测系统 防火墙 网络攻击 网络安全 入侵检测系统 路由器 计算机网络 SYN flood flooding detection system router agent distributed intrusion detection
  • 相关文献

参考文献7

  • 1Stevens W. Unix Network Programming. Volume 1: Networking APIs; Sockets and XTI. 2nd Edition. Beijing: Tsinghua University Press, 1999(in Chinese)(UNIX网络编程(第2版)第1卷: 套接口API和X/Open传输接口API. 北京: 清华大学出版社, 1999)
  • 2Noureldien N A, Osman I M. A stateful inspection module architecture. In: Proceedings of TENCON 2000, Kuala Lumpur, Malaysia, 2000.259~265
  • 3Postel J. Transmission Control Protocol. RFC 0793, 1981
  • 4Lemon J. Resisting SYN flood DoS attacks with a SYN cache. In: Proceedings of USENIX BSDCon 2002, San Francisco, California, USA, 2002.89~98
  • 5Wang H, Zhang D, Shin K G. Detecting SYN flooding attacks. In: Proceedings of Infocom 2002, New York, USA, 2002.1530~1539
  • 6Balasubramaniyan J S, Garcia-Fernandez J O, Isacoff D, Spafford E, Zamboni D. An architecture for intrusion detection using autonomous agents. In: Proceedings of Computer Security Applications Conference, Phoenix, Arizona, USA, 1998. 13~24
  • 7TanenbaumAS.计算机网络(第3版)[M].北京:清华大学出版社,1998..

共引文献3

同被引文献43

引证文献8

二级引证文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部