期刊文献+

混合型网络中DDoS攻击的入侵扫描研究

Research on scanning strategy of DDoS attack in hybrid networks
下载PDF
导出
摘要 现有网络中网络地址转换(NAT)的存在使得其后网络中的主机对外部网络变得不可见,IPv6庞大的地址空间也使得攻击者利用传统的随机地址扫描策略很难找到有漏洞主机。概述当前DDoS攻击的基本原理,具体分析了随着因特网体系结构的变化,网络NAT等设施的出现对DDoS攻击所带来的影响。针对传统理论在研究DDoS攻击过程中的一些不足,提出了一种基于搜索引擎技术和Teredo服务的新型扫描策略,以及对NAT后主机实施DDoS攻击的具体方法。仿真实验证明这种新型DDoS入侵攻击更加有效,对复杂网络环境的适应性也更强。 The technology of Network Adress Translator (NAT) is widely used in the Internet. With this technology, computers set behind the NAT are separated to the external net. Attacker can hardly find and invade those computer behind the NAT by the conventional technique. Some principles of DDoS attack were briefly introduced and a concrete analysis about the effect of NAT on DDoS attack was given. To overcome the weakness of traditional mode in describing the propagation of DDoS attack, a new scanning strategy based on the Teredo technology and search engines was presented. Attacker could more rapidly invade computers set behind the NAT and use those computers more efficiently to actualize the DDoS attack. Compared with the conventional invasive methods, the simulation results show that the new method is more effective and feasible.
出处 《计算机应用》 CSCD 北大核心 2009年第11期2964-2968,共5页 journal of Computer Applications
基金 国防科工委应用基础资金资助项目(JI300D004)
关键词 网络地址转换 Teredo服务 搜索引擎 bubble-to-open程序 Network Address Translation (NAT) Teredo service search engine bubble-to-open program
  • 相关文献

参考文献12

  • 1李德全著..拒绝服务攻击[M].北京:电子工业出版社,2007:378.
  • 2杜彦辉,马锐,刘玉树.Formalized Description of Distributed Denial of Service Attack[J].Journal of Beijing Institute of Technology,2004,13(4):360-364. 被引量:1
  • 3HINDEN R, DEERING S. IP version 6 addressing architecture [ J/ OL]. lntemet Engineering Task Force, 2006:192 - 194 [2009 -03 - 15]. http://www, left. nrg/rfc/rfc2373, txt. 被引量:1
  • 4邢长友,杨莉,陈鸣.网络蠕虫传播建模分析[J].电子科技大学学报,2007,36(3):590-593. 被引量:14
  • 5肖颖,云晓春,辛毅.基于搜索引擎蠕虫的分析与检测[J].计算机工程与应用,2006,42(7):112-115. 被引量:6
  • 6KIENZLE D M, ELDER M C. Recent worms: A survey and trends [C]// WORM 2003: Proceedings of the 2003 ACM Workshop on Rapid Maleode. New York: ACM Press, 2003:1 - 10. 被引量:1
  • 7HOAGLAND J. The teredo protocol: Tunneling past network security and other security implications[ EB/OL]. [ 2009 - 03 - 06]. http://www, symantec, com/aveenter/reference/Teredo _ pdf. 被引量:1
  • 8Microsoft. Teredo overview [ EB/OL]. (2006 - 06 - 23) [ 2009 - 03 - 18]. http://www, microsoft, com/technet/prodtechnol/winxp- pro/maintain/Teredo, mspx. 被引量:1
  • 9CHEN Z, GAO L, KWIAT K. Modeling the spread of active worms [C]//INFOCOM 2003: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. Washington, DC: IEEE Press, 2003, 3:1890 - 1900. 被引量:1
  • 10STREFTARIS G, GIBSON G J. Statistical inference for stochastic epidemic models [ C/OL]// Proceedings of the 17th International Workshop on Statistical Modelling. 2002:609 -616 [2009 -03 - 22]. http://www.ma. hw. ae. uk/- georges/researeh/SG _ iwsm02, pdf. 被引量:1

二级参考文献20

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2Debasis Mohanty.Demystifying Google Hacks.http://www.hackspirits.com/ 被引量:1
  • 3郑辉.Santy蠕虫分析报告.2004-12-23 被引量:1
  • 4Cliff C Zou,Lixin Gao,Weibo Gong et al.Monitoring and Early Warning for Internet Worms[C].In:10th ACM Conference on Computer and Communication Security (CCS'03),2003-10 被引量:1
  • 5Ke Wang,Salvatore J Stolfo.Anomalous Payload-based Network Intrusion Detection.RAID,2004-09 被引量:1
  • 6C Kruegel,T Toth,E Kirda.Service Specific Anomaly Detection for Network Intrusion Detection[C].In:Proceedings of the Symposium on Applied Computing(SAC),ACM Press 被引量:1
  • 7T Toth,C Kruegel.Accurate Buffer Overflow Detection via Abstract Payload Execution[C].In:5th Symposium on Recent Advances in Intrusion Detection(RAID),Lecture Notes in Computer Science,Springer Verlag,Switzerland,2002-10 被引量:1
  • 8Search Engine Marketing Firm iProspect Survey Confirms Importance of Visibility on the First Three Pages of Search Results.http://www.iprospect.com/media/press2004 04 20.htm 被引量:1
  • 9R Fielding,J Gettys.Hypertext Transfer Protocol HTTP/1.1[S].RFC 2612,1999-06 被引量:1
  • 10SONG D,MALAN R,STONE R.A snapshot of global internet worm activity[R].Arbor Networks,2001. 被引量:1

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部