期刊文献+

利用入侵检测技术防范DDoS 被引量:4

Defense of DDoS by Using Intrusion Detection Technology
下载PDF
导出
摘要  分布式拒绝服务攻击(DDoS)由多宿主机发动,是目前常见的网络攻击中比较严重的一种,难于检测和跟踪。为此,阐述了DDoS的攻击方式的体系结构,并较为详细地分析了DDoS的机理并给出了攻击实例,概述了入侵检测技术的概念,提出了利用入侵检测技术防范DDoS攻击的一种尝试。设计一个针对DDoS的入侵检测方案,该方案检测通过路由器的数据包的流量判断是否异常。如果发现数据包的异常发送,则发出受攻击信号。本方案由3部分组成:包分类,获取原始的网络流量统计;流量离散函数,计算网络数据包的发送特性;基于变异的检测,在当前流量远远偏离历史上的正常变化范围时做出反应。 Distributed denial of service (DDoS) performed by multiple hosts is one of the most serious problems in computer and network security, it difficult to detecte and trace. First, the system construction of the DDoS attack model was described, and the principles of DDoS attack were deeply analyzed. Then the example of DDoS attack case was presented. Second, the concepts of intrusion detection technology were summarized. At the last, some models of detection DDoS attack and some technical methods based on intrusion detection to prevent the DDoS from attacking were provided. A network intrusion detection scheme was proposed, which focused on detecting DDoS attacks. The proposed scheme detected if packets passing routers were found anomaly in traffic distribution, which could generate the attack signature as the anomaly in packet field distributions. The proposed scheme is composed of three stages. Packet classification, which can help classify the packets and get the characteristic of network traffic. Traffic dispersion function, which computes the character of the network packets distribution. Variance-based anomaly detection, the network traffic is treated as anomalistic if the variance of statistics exceeds the threshold decided by previous statistics.
作者 王世安
出处 《石油化工高等学校学报》 CAS 2004年第2期90-93,共4页 Journal of Petrochemical Universities
关键词 入侵检测技术 DDOS 分布式拒绝服务攻击 多宿主机 网络攻击技术 数据包 Intrusion detection technology DDoS Defense
  • 相关文献

参考文献10

二级参考文献49

  • 1MERIKE Kaeo.网络安全性设计[M].北京:人民邮电出版社,2000..
  • 2Russell Lusignan.Cisco网络安全管理[M].北京:中国电力出版社,2001..
  • 3[1]CERT(r)Advisory CA-1996- 21.http : / /www.cert.org/ advisories/ CA-1996-21.html
  • 4[2]CERT(r)Advisory CA- 1997-28.http://www.cert.org/advisories/CA-1997-28.html
  • 5[3]CERT(r)Advisory CA- 1998-01 .http://www.cert.org/advisories/CA-1998-01.html
  • 6[4]CERT(r)Advisory CA- 1999-17.http://www.cert.org/advisories/CA-1999-17.html
  • 7[5]CERT(r)Advisory CA-2000-11.http://www.cert.org/advisories/CA-2000-11.html
  • 8[6]CERT(r) Advisory CA-2000-21 .http://www.cert.org/advisories/CA-2000-21.html
  • 9[7]UDP Broadcast Flooding.http://www.ieng.com/univercd/cc/td/doc/cisintwk/ics/cs006.htm
  • 10[8]Denial of Service Attacks.http://www.cert.org/tech_tips/denial of-service.html

共引文献103

同被引文献31

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部