期刊文献+

DDoS攻击快速在线检测器的设计与实现 被引量:4

Design and Implementation of DDoS Attack Fast Detection Online
在线阅读 下载PDF
导出
摘要 设计并实现了1种基于小波变换的DDoS(分布式拒绝服务)攻击快速在线检测器.采用自定义的Socket方式进行在线数据包捕获,采用链表形式的数据包特征库进行数据特征存储,利用小波变换求解自相似系数在线检测DDoS攻击.试验结果表明,该设计可以快速区分DDoS攻击与正常大流量数据,并可有效检测出非知名DDoS攻击工具发起的攻击. A fast online detection method aiming at DDoS(distributed denial of service) attack detection based wavelet transform was presented. The user-defined Socket method was adopted to capture network packets, the linked-list packets character library was responsible for keeping packets, and DDoS attack was detected online based on changes in the characteristic of network self-similarity which was estimated by using the real-time wavelet transform. The experiment results show that the detection can distinguish real DDoS attack from the massive data flow, and can effectively detect DDoS attack launched by unknown DDoS tools fast.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2007年第3期122-125,共4页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(6057314170271050) 国家"863计划"项目(2006AA01z438) 南京市高科技项目(2006软资105) 现代通信国家重点实验室基金项目(9140C1101010603) 江苏省计算机信息处理技术重点实验室基金项目(kjs050001kjs0606)
关键词 小波分析 数据包捕获 分布式拒绝服务攻击 wavelet analysis packet capture distributed denial of service
  • 相关文献

参考文献7

  • 1吕慧勤,张宏,罗守山,杨义先.无缓冲服务的DoS攻击[J].北京邮电大学学报,2003,26(3):61-65. 被引量:6
  • 2胡尊美,王文国.DDoS攻击技术发展研究[J].网络安全技术与应用,2005(6):24-25. 被引量:5
  • 3Leland W,Tagqu M,Willinger W,et al.On the self-similar nature of ethernet traffic[C]∥IEEE.IEEE/ACM Transactions on Networking.[S.l.]:IEEE Press,1994:1-15.
  • 4Crovella M E,Bestavros A.Self-similarity in world wide web traffic:evidence and possible causes[C]∥ IEEE.IEEE/ACM Transactions on Networking.[S.l.]:IEEE Press,1997:835-846.
  • 5Ashish Chaurasia.Network packet capturing for Linux[EB/OL].2004[2006-05-16].http:∥www-128.ibm.com/developerworks/edu/l-dw-linux-packet-i.html.
  • 6Li Yongli,Liu Guizhong,Li Hongliang,et al.Wavelet-based analysis of hurst parameter estimation for self-similar traffic[C]∥IEEE.Acoustics,Speech,and Signal Processing,Proceedings(ICASSp'02).[S.l.]:IEEE Press,2002:2061-2064.
  • 7Mallat Stephane G.A theory for multiresolution signal decomposition:the wavelet representation[C]∥IEEE.IEEE Transactions on Pattern Analysis and Machine Intelligence.[S.l.]:IEEE Press,1989:674-693.

二级参考文献6

  • 1朱良根,张玉清,雷振甲.DoS攻击及其防范[J].计算机应用研究,2004,21(7):82-84. 被引量:20
  • 2Jaikumar V. Denial-of-service attacks still a threat[J/OL]. Computer World, 2002,http://www.landfield.com/isn/mail-archive/2002/Apr/0057, html.
  • 3Wang K K, Chang R. Engineering of a global defense infrastructure for DDoS attacks[A]. 10th IEEE International Conference[C]. 2002. 419-427.
  • 4David Dittrich. Usenix security symposium 2000, DDoS-is there really a threat?[J/OL]. http://staff.washington, edu/dittrich/talks/sec2000/, 2000-07-22.
  • 5Stevens W Richard. TCP/IP illustrated (Volume 1)[M]. Addison-Wesley, 1996.
  • 6Sterne D. Active network based DDoS defense[A].DARPA Active Networks Conference and Exposition, 2002[C]. 2002. 193-203.

共引文献9

同被引文献27

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部