期刊文献+

Design and Realization of Software for Guard Against DDoS Based on Self-Similar and Optimization Filter 被引量:1

Design and Realization of Software for Guard Against DDoS Based on Self-Similar and Optimization Filter
原文传递
导出
摘要 This paper proposes a distributed denial-of-service attack detection method based on self similar and wavelet analysis. This method adopts an optimized transmission control protocol cookie technology for filter optimization in order to accurately detect and efficiently filter the traffic of distributed denial-of-service attack. This paper presents the design of our software, and describes all important algorithms of detection and filtering. Experimental results showed that our method has only a low delay to detect abnormal traffic of distributed denial-of-service attacks, and with a high percentage o f filtering. This paper proposes a distributed denial-of-service attack detection method based on self similar and wavelet analysis. This method adopts an optimized transmission control protocol cookie technology for filter optimization in order to accurately detect and efficiently filter the traffic of distributed denial-of-service attack. This paper presents the design of our software, and describes all important algorithms of detection and filtering. Experimental results showed that our method has only a low delay to detect abnormal traffic of distributed denial-of-service attacks, and with a high percentage o f filtering.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2006年第1期44-48,共5页 中国邮电高校学报(英文版)
基金 ThisworkissupportedbyNationalNaturalScienceFoundationofChina(60573141) National"863"HighTechnologyProjectsofChina(2005AA775050) NaturalScienceFoundationofJiangsuProvince(BK2005146) HighTechnologyResearchandDevelopmentProgramofJiangsuProvince(BG2004004,BG2005037) KeyLaboratoryofInformationTechnologyprocessingofJiangsuProvince(kjs05001) JiangsuProvincialResearchSchemeofNaturalScienceforHigherEdu-cationInstitutions(05KJB520092).
关键词 DDOS self similar FILTER WAVELET DDoS self similar filter wavelet
  • 相关文献

参考文献5

二级参考文献31

  • 1孙钦东,张德运,孙朝晖,张晓.基于流连接密度的分布式拒绝服务攻击检测[J].西安交通大学学报,2004,38(10):1048-1052. 被引量:5
  • 2胡守仁 余少波.神经网络导论[M].北京:国防科技出版社,1997.1-176.
  • 3胡昌振 李贵陶.面向21世纪安全与防护[M].北京:希望电子出版社,1997..
  • 4[1]W.E. Leland, M. S. Taqqu, W. Willinger, D. V. Wilson, On the self-similar nature of Ethernet traffic (extended version), IEEE/ACM Trans. on Networking, 1994, 2(1), 1-15.
  • 5[2]J. Beran, R. Sherman, M. S.Taqqu, W. Willinger, Long range dependence in variable bit rate video traffic, IEEE Trans. on Communication, 1995, 43(2/3/4), 1566-1579.
  • 6[3]P. Abry, D. Veitch, Wavelet analysis of long-range dependent traffic, IEEE Trans. on Information Theory, 1998, 44(1), 2-15.
  • 7[4]Z. Sahinoglu, S. Tekinay, Multiresolution decomposition and burstiness analysis of traffic traces,Wireless Communications and Networking Conference, WCNC. New Orleans, LA, USA, IEEE,Vol.2, 1999, 560-563.
  • 8[5]P. Abry, P. Goncalves, P. Flandrin, Wavelet-based spectral analysis of 1/f process, IEEE International Conference on Acoustics, Speech, and Signal Processing, Minneapolis, MN, USA, Vol.3,1993, 237-240.
  • 9[6]G. Wornell, Signal Processing with Fractal: A Wavelet Based Approach, Prentice Hall, Znc. NJ,1995, 30-57.
  • 10[7]B. Tsybakov, N. D. Georganas, On self-similar traffic in ATM queues: Definitions, overflow probability bound, and cell delay distribution, IEEE/ACM Trans. on Networking, 1997, 5(3),397-409.

共引文献89

同被引文献8

  • 1任勋益,王汝传,张登银.R/S和小波分析法检测DDoS攻击的研究与比较[J].南京邮电大学学报(自然科学版),2006,26(6):48-51. 被引量:9
  • 2Leland W,Taqqu M,Wrllinger W,et al. On the self-similar na- ture of ethemet traffic (extended version ) [ J ]. IEEE/ACM Trans on Networking,1994,2( 1 ) :1-15.
  • 3Paxaon V, Floyd S. Wide area traffic : The failure of Passion modeling[ J ]. IEEE/ACM Trans on Networking, 1995,3 ( 3 ) :226-244.
  • 4Crovella M E, Bestavros A. Explaining World Wide Web Traffic Self-Similarity [ R ]. Technical Report: TR-95-015, Computer Science Department, Boston University, 1995.
  • 5Tsybakov B, Georganas N D. On self-similar traffic in ATM queues: Definitions, overflow probability bound, and cell delay distribution [ J ]. IEEE/ACM Trand on Networking, 1997,5(3) :397-409.
  • 6Vern Paxson. Fast approximate synthesis of fractional gauss- ian noise for generating self-similar network traffic [ J ]. ACM SIGCOMM Computer Communication Review,1997, 27(5) :5-18.
  • 7Erramilli A, Narayan O, Wilinger W. Experimental queuing analysis with long-rang dependent packet traffic [ J ]. IEEE/ACM Trans on Networking, 1996,4 (2) :209-223.
  • 8RFC2460, Internet Protocol Version6 ( IPv6 ) Specification[s].

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部