分布式反射拒绝服务攻击(Distributed Reflection Denial of Service At ack)是一种不同于DDoS的、新式的DoS攻击方式,它不需要在实际攻击之前占领大量傀儡机,而是巧妙地利用了反弹服务器群来将洪水数据包反弹给目标主机。近两年,...分布式反射拒绝服务攻击(Distributed Reflection Denial of Service At ack)是一种不同于DDoS的、新式的DoS攻击方式,它不需要在实际攻击之前占领大量傀儡机,而是巧妙地利用了反弹服务器群来将洪水数据包反弹给目标主机。近两年,随着DRDoS攻击技术的日趋成熟,利用服务器群发起的DRDoS攻击事件越来越多,而一般所采用的以防火墙为主的防护技术对此类新型攻击手段已显得力不从心。本文分析了DRDoS的攻击原理、过程及DRDoS防御现状。展开更多
随着网络技术的迅速发展,由此带来的网络安全问题也得到了更多的关注。本文首先分析了新型的网络攻击方式--DRDoS的攻击原理及其防御方案;然后利用ASP+SQL Sever 2000设计完成的网上售书系统作为测试对象,对其实现DRDoS的攻击过程和防...随着网络技术的迅速发展,由此带来的网络安全问题也得到了更多的关注。本文首先分析了新型的网络攻击方式--DRDoS的攻击原理及其防御方案;然后利用ASP+SQL Sever 2000设计完成的网上售书系统作为测试对象,对其实现DRDoS的攻击过程和防御效果测试。测试结果表明:DRDoS虽然不能完全被防止,但采用一定的防御措施可以起到降低其破坏后果的作用。展开更多
Dos(Denial of service,拒绝服务)攻击是网上比较常见的攻击方式,其目的是使计算机或网络无法提供正常的服务;DDOS(Distributed reflection denial of service,分布式拒绝服务)攻击则更进一步;DRDos(Distributed reflection Denial...Dos(Denial of service,拒绝服务)攻击是网上比较常见的攻击方式,其目的是使计算机或网络无法提供正常的服务;DDOS(Distributed reflection denial of service,分布式拒绝服务)攻击则更进一步;DRDos(Distributed reflection Denial of service,分布式反射拒绝服务)攻击由于其“反射”的特点更具威力……展开更多
The proliferation of Internet of Things(IoT)rapidly increases the possiblities of Simple Service Discovery Protocol(SSDP)reflection attacks.Most DDoS attack defence strategies deploy only to a certain type of devices ...The proliferation of Internet of Things(IoT)rapidly increases the possiblities of Simple Service Discovery Protocol(SSDP)reflection attacks.Most DDoS attack defence strategies deploy only to a certain type of devices in the attack chain,and need to detect attacks in advance,and the detection of DDoS attacks often uses heavy algorithms consuming lots of computing resources.This paper proposes a comprehensive DDoS attack defence approach which combines broad learning and a set of defence strategies against SSDP attacks,called Broad Learning based Comprehensive Defence(BLCD).The defence strategies work along the attack chain,starting from attack sources to victims.It defends against attacks without detecting attacks or identifying the roles of IoT devices in SSDP reflection attacks.BLCD also detects suspicious traffic at bots,service providers and victims by using broad learning,and the detection results are used as the basis for automatically deploying defence strategies which can significantly reduce DDoS packets.For evaluations,we thoroughly analyze attack traffic when deploying BLCD to different defence locations.Experiments show that BLCD can reduce the number of packets received at the victim to 39 without affecting the standard SSDP service,and detect malicious packets with an accuracy of 99.99%.展开更多
In the design and planning of next-generation Internet of Things(IoT),telecommunication,and satellite communication systems,controller placement is crucial in software-defined networking(SDN).The programmability of th...In the design and planning of next-generation Internet of Things(IoT),telecommunication,and satellite communication systems,controller placement is crucial in software-defined networking(SDN).The programmability of the SDN controller is sophisticated for the centralized control system of the entire network.Nevertheless,it creates a significant loophole for the manifestation of a distributed denial of service(DDoS)attack straightforwardly.Furthermore,recently a Distributed Reflected Denial of Service(DRDoS)attack,an unusual DDoS attack,has been detected.However,minimal deliberation has given to this forthcoming single point of SDN infrastructure failure problem.Moreover,recently the high frequencies of DDoS attacks have increased dramatically.In this paper,a smart algorithm for planning SDN smart backup controllers under DDoS attack scenarios has proposed.Our proposed smart algorithm can recommend single or multiple smart backup controllers in the event of DDoS occurrence.The obtained simulated results demonstrate that the validation of the proposed algorithm and the performance analysis achieved 99.99%accuracy in placing the smart backup controller under DDoS attacks within 0.125 to 46508.7 s in SDN.展开更多
文摘分布式反射拒绝服务攻击(Distributed Reflection Denial of Service At ack)是一种不同于DDoS的、新式的DoS攻击方式,它不需要在实际攻击之前占领大量傀儡机,而是巧妙地利用了反弹服务器群来将洪水数据包反弹给目标主机。近两年,随着DRDoS攻击技术的日趋成熟,利用服务器群发起的DRDoS攻击事件越来越多,而一般所采用的以防火墙为主的防护技术对此类新型攻击手段已显得力不从心。本文分析了DRDoS的攻击原理、过程及DRDoS防御现状。
文摘随着网络技术的迅速发展,由此带来的网络安全问题也得到了更多的关注。本文首先分析了新型的网络攻击方式--DRDoS的攻击原理及其防御方案;然后利用ASP+SQL Sever 2000设计完成的网上售书系统作为测试对象,对其实现DRDoS的攻击过程和防御效果测试。测试结果表明:DRDoS虽然不能完全被防止,但采用一定的防御措施可以起到降低其破坏后果的作用。
文摘Dos(Denial of service,拒绝服务)攻击是网上比较常见的攻击方式,其目的是使计算机或网络无法提供正常的服务;DDOS(Distributed reflection denial of service,分布式拒绝服务)攻击则更进一步;DRDos(Distributed reflection Denial of service,分布式反射拒绝服务)攻击由于其“反射”的特点更具威力……
基金The work presented in this paper is supported by the Shandong Provincial Natural Science Foundation(No.ZR2020MF04)National Natural Science Foundation of China(No.62072469)+2 种基金the Fundamental Research Funds for the Central Universities(19CX05027B,19CX05003A-11)West Coast Artificial Intelligence Technology Innovation Center(2019-1-5,2019-1-6)the Opening Project of Shanghai Trusted Industrial Control Platform(TICPSH202003015-ZC).
文摘The proliferation of Internet of Things(IoT)rapidly increases the possiblities of Simple Service Discovery Protocol(SSDP)reflection attacks.Most DDoS attack defence strategies deploy only to a certain type of devices in the attack chain,and need to detect attacks in advance,and the detection of DDoS attacks often uses heavy algorithms consuming lots of computing resources.This paper proposes a comprehensive DDoS attack defence approach which combines broad learning and a set of defence strategies against SSDP attacks,called Broad Learning based Comprehensive Defence(BLCD).The defence strategies work along the attack chain,starting from attack sources to victims.It defends against attacks without detecting attacks or identifying the roles of IoT devices in SSDP reflection attacks.BLCD also detects suspicious traffic at bots,service providers and victims by using broad learning,and the detection results are used as the basis for automatically deploying defence strategies which can significantly reduce DDoS packets.For evaluations,we thoroughly analyze attack traffic when deploying BLCD to different defence locations.Experiments show that BLCD can reduce the number of packets received at the victim to 39 without affecting the standard SSDP service,and detect malicious packets with an accuracy of 99.99%.
基金TM R&D Sdn Bhd fully supports this research work under Project RDTC160902.S.C.Tan and Z.Yusoff received the fund.Sponsors’Website:https://www.tmrnd.com.my.
文摘In the design and planning of next-generation Internet of Things(IoT),telecommunication,and satellite communication systems,controller placement is crucial in software-defined networking(SDN).The programmability of the SDN controller is sophisticated for the centralized control system of the entire network.Nevertheless,it creates a significant loophole for the manifestation of a distributed denial of service(DDoS)attack straightforwardly.Furthermore,recently a Distributed Reflected Denial of Service(DRDoS)attack,an unusual DDoS attack,has been detected.However,minimal deliberation has given to this forthcoming single point of SDN infrastructure failure problem.Moreover,recently the high frequencies of DDoS attacks have increased dramatically.In this paper,a smart algorithm for planning SDN smart backup controllers under DDoS attack scenarios has proposed.Our proposed smart algorithm can recommend single or multiple smart backup controllers in the event of DDoS occurrence.The obtained simulated results demonstrate that the validation of the proposed algorithm and the performance analysis achieved 99.99%accuracy in placing the smart backup controller under DDoS attacks within 0.125 to 46508.7 s in SDN.