期刊文献+

防御TCP拒绝服务攻击的改进方法 被引量:2

Improved Approach to Resisting TCP DoS Attacks
下载PDF
导出
摘要 提出了对SYNProxy机制的改进方法,将哈希表和SYNcookie结合起来处理半连接表:在低强度攻击下采用哈希表,在高强度攻击下采用SYNCookie。在此基础上,采用位图优化哈希表算法。改进方法可以防御更大强度的攻击。改进方法已经应用在防火墙中,测试表明该方法可以防御高强度的TCP拒绝服务攻击。 The TCP SYN flooding is the most commonly used DoS attack.Many solutions exist to protect against SYN flooding,while SYN proxy is a firewall's approach.This paper introduces an improved approach on SYN proxy,explains its design,and evaluates its performance.In this approach,an improved hash table is used to save the half-connection states,which holds a bitmap in its bucket,and better performance is achieved.The hash table limits its bucket length.When a bucket exceeds its limit,it drops half-connection states,and migrates to SYN cookie.This keeps the balance a-mong performance,service quality,resources,and other factors.The proposal is implemented in a firewall,and tests demonstrate good performance achieved.
出处 《计算机工程与应用》 CSCD 北大核心 2003年第20期22-24,31,共4页 Computer Engineering and Applications
基金 国家863高技术研究发展计划"网络安全管理与测评技术"基金资助(编号:863-301-05-03) 国家"九五"科技攻关基金资助(编号:96-743-01-04-01)
关键词 TCP 拒绝服务攻击 SYN FLOODING 哈希算法 防火墙 TCP,DoS,SYN Flooding,Hash,Firewall
  • 相关文献

参考文献10

  • 1WFord WTopp.数据结构[M].清华大学出版社,1997.. 被引量:1
  • 2J Lemon.Resisting SYN Flooding DoS Attacks with a SYN Cache[C]. In:Proc of USENIX Symposium on Internet Technologies and Systems'97,1997. 被引量:1
  • 3D J Bernstein.SYN Cookies.http://cr.yp.to/syncookies.html. 被引量:1
  • 4Netscreen 100 Firewall Applicance.http://www.netscreen.com. 被引量:1
  • 5C L Schuba et al.Analysis of Denial of Service Attack on TCP[C]. In:Proc of IEEE Symposium on Security and Privacy,1997. 被引量:1
  • 6P Ferguson,D Senie.Network Ingress filtering:Defeating Denial of Service Attacks which employ IP Source Address Spoofing[S].RFC2267, 1998. 被引量:1
  • 7J Ioannidis,S M Bellovin.Implementing Pushback:Router-based Defense Against DDoS Attacks[C].In:Proc of Network and Distributed System Security Symposium,2002. 被引量:1
  • 8T Darmohray,R Oliver.Hot Spares for DoS Attacks[J].login,2000;25(7). 被引量:1
  • 9J Zobel et al.In-memory hash tables for accumulating text vocabularies[J].Information Processing Letters,2001 ;80(6) :271-277. 被引量:1
  • 10D Mosberger,T Jin.Httperf-A Tool for Measuring WEB Server Performance[C].In:SIGMETRICS Workshop on Internet Server Performance, 1998. 被引量:1

同被引文献7

  • 1Schuba Christoph L,Krsul Ivan V,Kuhn Markus G,et al.Analysis of a denial of service attack on TCP.Security and Privacy,1997.Proceedings,1997 IEEE Symposium on 4-7 May 1997 Page(s):208-223 被引量:1
  • 2Comer Douglas E.Internetworking with TCP/IP(4th Edition,Volume1).北京:人民邮电出版社,2002 被引量:1
  • 3Mohamad Chouman,Haidar Safa,Hassan Artail.A novel defense mechanism against sYN flooding attacks in IP networks.Electrical and Computer Engineering,2005.Canadian Conference on May 1-4,2005:2151-2154 被引量:1
  • 4Haining Wang,Danlu Zhang,Shin Kang G.SYN-dog:sniffing SYN flooding sources.Distributed Computing Systems,2002.Proceedings 22nd International Conference on 2-5 July 2002 Page(s):421-428 被引量:1
  • 5Bin Xiao,Wei Chen,Yanxiang He,et al.An active detecting method against SYN flooding attack.Parallel and Distributed System,2005.Proceedings 11th International Conference on Volume 1,20-22 July 2005 Page(s):709-715 被引量:1
  • 6蒋天发,陆际光.Intranet安全技术的研究[J].武汉理工大学学报(交通科学与工程版),2002,26(6):729-732. 被引量:26
  • 7肖原,王晟,李乐民.基于主动网的SYN攻击防御[J].电子科技大学学报,2003,32(3):280-284. 被引量:3

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部