期刊文献+

一种基于历史信任数据的DDOS防御模型 被引量:2

A Model Based on Historical Trusted Data to Defense DDOS
下载PDF
导出
摘要 分布式拒绝服务攻击给网络安全和网络服务质量带来了巨大的威胁。通过对分布式拒绝服务攻击原理及现有防御措施的分析,为了更有效防御这类攻击的发生,可以考虑在边界路由器上建立一种基于历史信任数据的源地址库的防御模型。该模型以历史信任数据库为依托,通过对异常IP包使用核心无状态公平排队算法进行源地址检测并对其处理结果做出相应的处理,可以有效、快速过滤掉异常的IP包数据,提前防止网络受到分布式拒绝服务攻击的侵害。 The distributed denial of service attacks brought an enormous threat to network security and network quality of service. Through analysing principle of distributed denial of service attack and the existing preventive measures,in order to more effectively defend against such attacks, the border routers can be taken to establish a defense model based on historical trusted data of the source address. The model is based on a historical trusted database,and to the abnormal IP used CSFQ source address detection and makes treatment with outcome of the algorithm. The model can be effective, rapid filter abnormal IP packet data, in advance to prevent networks against distributed denial of service attack.
出处 《计算机技术与发展》 2007年第7期160-162,199,共4页 Computer Technology and Development
基金 国家人事部高层次留学人员回国工作资助项目(国人部发[2004]61号)
关键词 分布式拒绝服务攻击 历史信任数据 异常IP包 源地址检测 核心无状态公平排队算法 DDOS historical trusted data abnormal IP souree address detected CSFQ
  • 相关文献

参考文献6

  • 1黄志洪主编,李俊宇等编著..现代计算机信息安全技术[M].北京:冶金工业出版社,2004:670.
  • 2朱良根,张玉清,雷振甲.DoS攻击及其防范[J].计算机应用研究,2004,21(7):82-84. 被引量:20
  • 3薛立军.分布式拒绝服务攻击检测与防护[D].西安:西安电子科技大学,2003. 被引量:1
  • 4罗光春..入侵检测若干关键技术与DdoS攻击研究[D].电子科技大学,2003:
  • 5CipherTrust.GpherTrust's Zombie Stats[EB/OL].2006 -07-15.http://www.ciphertrust.com/resources/statistics/zombie.php. 被引量:1
  • 6严蔚敏,吴伟民编著..数据结构 C语言版[M].北京:清华大学出版社,2002:334.

二级参考文献6

  • 1[4]抗拒绝服务产品[EB/OL].http://www.nsfocus.com/homepage/products/collapsar.htm. 被引量:1
  • 2[5]Help Defeat Denial of Service Attacks:Step-by-step[EB/OL].http://www.sans.org/dosstep/. 被引量:1
  • 3[6]Managing the Threat of Denial of Service [EB/OL].http://www.cert.org/archive/pdf/ManagingDoS.pdf. 被引量:1
  • 4[1]Distributed Reflection Denial of Service[EB/OL].http://grc.com/dos/drdos.htm. 被引量:1
  • 5[2]CERT(R) Coordination Center Denial of Service Attacks[DB/OL].http://www.cert.org/techtips/denialofservice.html#1. 被引量:1
  • 6[3]CERT(R) Advisory CA-2000-01 Denial-of-Service Developments[DB/OL].http://www.cert.org/advisories/CA-2000-01.html. 被引量:1

共引文献19

同被引文献19

  • 1王永利,徐宏炳,董逸生,钱江波,刘学军.分布式数据流增量聚集[J].计算机研究与发展,2006,43(3):509-515. 被引量:4
  • 2MIRKOVIC JELENA .Attacking DDoS at the source[A]. Proceedings of the 10th IEEE International Conference on Network Protocols [C]. Paris, France, 2002.366-369 被引量:1
  • 3FERGUSON P, SENIE D. Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing[R] Internet Best Current Practice, RFC 2827, May 2000. 被引量:1
  • 4WALFISH M, VUTUKURU M. DDoS defense by offense [A], SIGCOM'06[C]. 2006.1635-1639. 被引量:1
  • 5PENG T, LECKIE R, RAMAMOHANARAO T. Survey of network-based defense mechanisms countering the DoS and DDoS problems[J]. ACM Computing Surveys, 2007,39(1):321-342. 被引量:1
  • 6JIN C H, WANG K SHIN. Hop-count filtering: an effective defense against spoofed DDoS traffic[A]. Proceedings of the 10th ACM Conference on Computer and Communications Security[C]. Washington, D C, USA, 2003.126-137 被引量:1
  • 7TUPAKULA U, VARADHARAJAN V. Analysis of Trace-Back Technique[R]. 2006. 被引量:1
  • 8ALLMAN M, BLANTON E, PAXSON V. An architecture for developing behavioral history[A]. Proceedings of SRUTI USENIX Association[C]. 2005.45-51. 被引量:1
  • 9WEI S J, MIRKOVIC J. Building reputations for internet clients[J]. Published in Electronic Notes in Theoretical Computer Science, 2006.66-78. 被引量:1
  • 10ANDERSON T. ROSCOE D. WETHERALL. Preventing Internet denial of service with capabilities[A]. Proc of Hot Nets-Ⅱ 2004[C]. 2004.39-44. 被引量:1

引证文献2

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部