期刊文献+

一种运用限幅自相似性的新型DDoS入侵检测机制

A Novel Mechanism of DDoS Intrude Detection Based on Setting a Limit and Self-Similarity
下载PDF
导出
摘要 本文提出了一种新型的DDoS入侵检测方法,在建立正常网络流量模型基础上,对网络流量的自相似性—Hurst参数、Hurst参数的时变函数H(t)进行分析,对网络流量进行实时限幅,由自相似性的变化来预测DDoS攻击,并用数据库对攻击定位。试验表明基于网络流量的统计分析方法能够在一定程度上检测出DDoS攻击,比传统的基于特征匹配的DDoS入侵检测方法,在实时性、准确率上有较大提高。 This paper presents a novel mechanism of DDoS Intrude Detection. We do researches on constructing normal model of network traffic, analysizing Self-Similarity of network traffics-Hurst Parameter, and its time variable function H(t). Through limiting the extent of network traffic in time, we measure the change of H Parameter brought by DDoS attack. Moreover we use Distributed Database to refine the DDoS attack. As it shown by the research result, this statistical analysis method can detect DDoS attack and is more reliable on the recognition of kinds of DDoS attack than any other traditional method based on character recognition-
出处 《计算机科学》 CSCD 北大核心 2004年第3期80-85,共6页 Computer Science
基金 国家九七三(项目号973-1-4-2) 电子科技大学青年基金支持
关键词 计算机网络 网络安全 入侵检测系统 DDOS 网络流量 限幅自相似性 Intrude detection, DDoS. Self-similarity
  • 相关文献

参考文献11

  • 1蔡弘,陈惠民,李衍达.自相似业务模型——通信网络突发业务建模的新方法[J].通信学报,1997,18(11):51-59. 被引量:28
  • 2陈惠民,蔡弘,李衍达.自相似业务:基于多分辨率采样和小波分析的Hurst系数估计方法[J].电子学报,1998,26(7):88-93. 被引量:14
  • 3Leland W, Taqqu M,Willinger W,Wilson D. On the Self-Similar Nature of Ethernet Traffic. IEEE/ACM Transactions on Networking, 1994,2(1): 1-5
  • 4Popescu A. Traffic Self-Similarity. In: Proc. of the IEEE Intl. Conf. on Telecommunications, Jun. 2001
  • 5Taqqu M S,Teverovsky V. On Estimating the Intensity of LongRange Dependence in Finite and Infinite Variance Time Series. preprint Boston University, USA, 1996
  • 6Taqqu M S, Willinger W, Sherman R. Proof of a Fundamental Result in Self-Similar Traffic Modeling. Computer Communication Review, 1997,27 (2)
  • 7Meadows C. A formal framework and evaluation method for network denial of service. In: Proc. of the 12th IEEE Computer Security Foundations Workshop, June 1999
  • 8Willinger W, Taqqu M S, Sherman R,Wilson D V. Self-similarity through High Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level. IEEE/ACM Transactions on Networking, 1997,5(1)
  • 9Reiher P, Prier G, Michel S, Li J. Project D-WARD: DDoS Network Attack Recognition and Defense', UCLA. http://lever. cs. ucla. edu/ddos/, Aug. 2001
  • 10Erramilli A, Willinger W,Wang J L. Modeling and Management of Self-Similar Traffic Flows in High-Speed Networks. Network Systems Design, Gordon and Breach Science Publishers, 1999

二级参考文献9

  • 1Fan Y H,Performance analysis of ATM switches with self-similar traffic,1996年
  • 2Huang C C,ICC’95,1995年
  • 3Wang Q L,IEEE/ACM Trans on Networking,1993年,1卷,2期,230页
  • 4Huang C C,ACM Comput Commun Rev,25卷,4期,114页
  • 5蔡弘,96’中国智能自动化学术会议,1996年
  • 6蔡弘,IEEE ICIT’96,1996年
  • 7Cai Hong,IEEE Int Conf on Industrial Technology,1996年,791页
  • 8秦前清,实用小波分析,1994年
  • 9蔡弘,陈惠民,李衍达.自相似业务模型——通信网络突发业务建模的新方法[J].通信学报,1997,18(11):51-59. 被引量:28

共引文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部