期刊文献+

基于流量强度的DDoS攻击源追踪快速算法

Fast Algorithm Based on Traffic Intensity for DDoS Attack Source Track
下载PDF
导出
摘要 DDoS攻击以其破坏力大、易实施、难检测、难追踪等特点,而成为网络攻击中难处理的问题之一。攻击源追踪技术是阻断攻击源、追踪相关责任、提供法律证据的必要手段。基于网络拓扑理论和路由器流量特性原理以及可编程式路由器的体系结构,提出了一种追踪DDoS攻击源的分布式快速算法,该算法可以准确、协调、高效地判断路由器的数据流量值,受害者可以根据流量强度推断出恶意攻击数据流的来源,从而快速追溯和定位DDoS攻击源。 DDoS attack whose damage is great to the network,easy to implement,difficult to detect,difficult to track and so on,is one of the intractable problems in network protection.Network attack source track is an essential technology in stopping on-going attacks,prosecuting,and deterring attackers.Based on network topology and traffic principle of routers,a fast distributed algorithm for tracking DDoS attack source is proposed.The algorithm can determine the data traffic values of routers traffic accurately,coordinately and efficiently,the victim can infer the source of malicious data traffic by traffic intensity.Therefore,it can locate the attack origins rapidly and accurately.
出处 《现代电子技术》 2010年第7期131-134,共4页 Modern Electronics Technique
基金 陕西省自然科学基金资助项目(2007F50)
关键词 DDOS攻击 攻击源追踪 流量强度 追踪算法 DDoS attack attack source track traffic intensity track algorithm
  • 相关文献

参考文献6

  • 1CERT Coordination Center. Denial of service attacks [EB/OL]. http: //www. cert. org/tech_tips/denial_of service, html. 被引量:1
  • 2TAYLOR DE, LOCKWOOD J W, SPROULL T S, et al. Scalable IP lookup for programmable routers [C]. New York.. IEEE Infoeom. , 2002,. 被引量:1
  • 3QIE X, BAVIER A, PETERSON L, et al. Scheduling computations on a software-based router[C]. Cambridge: ACM SIGMETRICS, 2001. 被引量:1
  • 4WONG T Y, LAW K T, LUI J C S, et al. An efficient distributed algorithm to identify and traceback DDoS[J]. Traffic The Computer Journal, 2002, 49 : 605-611. 被引量:1
  • 5CHANDY K M, LAMPORT L. Distributed apshots:determining global states of distributed systems[C]. [S. l.]: ACM Trans. Comput. Syst. , 1985. 被引量:1
  • 6田开琳,李明.一种可靠检测低速率DDoS攻击的异常检测系统[J].现代电子技术,2009,32(7):68-71. 被引量:2

二级参考文献10

  • 1胡文静,李明,刘锦高.基于LIBPCAP的网络流量实时采集与信息萃取[J].计算机应用研究,2006,23(6):236-238. 被引量:4
  • 2田绪安,何鹏,谢文佳.入侵检测系统探究[J].现代电子技术,2007,30(11):77-79. 被引量:1
  • 3Li M, Wang S, Zhao W. A Real- time and Reliable Approach to Detecting Traffic Variations at Abnormally High and Low Rates[A]. ATC 2006[C]. Springer LNCS 4158,2006, 541 - 55O. 被引量:1
  • 4LI M. An Approach for Reliably Identifying Signs of DDoS Flood Attacks Based on lrd Traffic Pattern Recognition[J]. Computers & Security, 2004,23 (7) : 549 - 558. 被引量:1
  • 5Kuzmanovic A, Knightly W E. Low - rate Tcp - targeted Denial of Service Attacks and Counter Strategies [J].IEEE ACM Trans. on Networking, 2006,14(4) : 683 - 696. 被引量:1
  • 6Sun H, Lui J C S, Yau D K Y. Distributed Mechanism in Detecting and Defending Against the Low - rate TCP Attack[J].Computer Networks, 2006, 50 (13): 2 312 - 2 330. 被引量:1
  • 7Manual Reference Pages. PCAP(3) [EB/OL]. http:// www. squarebox, co. uk/egi - squarebox/man Server/usr/ share/man/man3/pcap. 3,2004. 被引量:1
  • 8Stevens W R, TCWIP Illustrated Volume 1: The Protocols [M]. American : Addison - Wesley, 2002. 被引量:1
  • 9Wright G R, Stevens W R. TCP/IP Illustrated Volume 2:The Implementation[M]. American: Addison - Wesley, 2002. 被引量:1
  • 10Li M, H C Chi. A Correlation - based Computational Method for Simulating Long - range Dependent Data[J].Journal of the Franklin Institute, 2003, 340 (6- 7):503 -514. 被引量:1

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部