期刊文献+

基于网络处理器的多维统计异常检测系统 被引量:2

Multi-dimensional anomaly detection system based on network processor
在线阅读 下载PDF
导出
摘要 基于网络处理器开发的网络设备能够很好地解决灵活性和高性能之间的矛盾。基于网络处理器IXP2400自身的特点,设计了多维异常检测系统。该系统可以有效地检测和防御DDOS攻击。根据TCP/IP协议簇,对数据包进行多维解析,统计以及异常标记。仿真和硬件实验的验证数据表明,该系统能准确无误地按照设计目标一一分解数据包,并标记出异常值,从而为后续的网络安全的研究和防御工作提供可靠的数据保证。 With appearance of network processor,the equipment based on network processor can solve the contradictions between flexibility and high performance.Design abnormal detection system is due to the character of IXP2400 network processor.The system can effectively detect and defence DDOS attack.According to TCP/IP protocol cluster,multi-dimensional analyse data packets and statics abnormal mark.The data show that the system can accurately analyze data packets and mark up abnormal value by a series of simulation and hardware experiment to provide network safety research and defense work.
出处 《计算机工程与设计》 CSCD 北大核心 2010年第13期2951-2954,2958,共5页 Computer Engineering and Design
关键词 DDOS攻击 网络处理器 异常检测 多维 异常标记 DDOS attacks network processor anomaly detection multi-dimensional anomaly marker
  • 相关文献

参考文献8

  • 1Feinstein L,Schn ackenberg D,Balupari R,et al.Statistical approaches to DDoS attack detection and response[C].Washington:Proceedings of the DARPA Information Survivability Conference and Exposition,2003:303-314.
  • 2Erik J Johnson,Aaron R Kunze.IXP 2400/2800 programming[Z].Complete Microengine Coding Guide,Intal Press,2003.
  • 3IXP2400 hardware reference manual[R].Intel Corporation,2003.
  • 4Charitakis I,Anagnostakis KG,Markatos E.An active traffic splitter architecture for intrusion detection[C].Orlando:MASCOTS IEEE Computer Society,2003:238-241.
  • 5李信满,赵大哲,赵宏,刘积仁.基于应用的高速网络入侵检测系统研究[J].通信学报,2002,23(9):1-7. 被引量:29
  • 6杨彬,李雪莹,陈宇,许榕生.利用LINUX集群实现高速网入侵检测[J].计算机工程与应用,2003,39(23):151-153. 被引量:8
  • 7Intel Corp.IXP2400 network processor hardware reference manual[S].2003.
  • 8彭蔓蔓,喻飞,李仁发.一种基于网络处理器的入侵检测系统[J].计算机应用研究,2004,21(4):115-117. 被引量:8

二级参考文献21

  • 1章文嵩.Linux服务器集群系统( LVS ).http ://www-900.ibm.com/developerWorks/cn/linux/cluster/lvs/part 1/index.shtml.,.
  • 2John L Hennessy,David A Patterson.Computer Architecture,A Quantitative Approach.Elsevier Science Pte Ltd,2003.
  • 3Joseph Mack LVS-HOWTO.http://www.linuxvirtualserver.org/Joseph. Mack/HOWTO/index.html/, 2002.
  • 4Paul E Proctor.The Practical Intrusion Detection Handbook[M].Prenrice Hall PTR,2001.
  • 5T Tidwell, R Larson, K Fitch et al, Modeling Internet Attacks [ C ],Proceedings of the 2001 IEEE Workshop on Information Assurance and Security,2001.54- 59.
  • 6Wenke Leesal, Vatore J Stolfo. A Framework for Constructing Features and Models for Intrusion Detection Systems[J]. ACM Transactions on Information and System Security,2000,3 (4) :227-261.
  • 73rd Generation Intrusion Detection Technology from Network ICE[EB/OL].http://www.networkice.com,2000.
  • 8Kennedy J, Melinck R. Overview of Network Processor [ J ]. Network Processor Conference,2000 : V (6) : 232.
  • 9IPX1200 Hardware Reference Manual [ EB/OL ]. http ://www. intel.com ,2000.
  • 10SANDHU R S. Authentication, access control and intrusion detection[J]. IEEE Communications Magazine, 1994, 32(9): 40-48.

共引文献38

同被引文献11

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部