期刊文献+

基于DSP的Shrew DDos攻击检测 被引量:1

Shrew DDos attack detection based on DSP
在线阅读 下载PDF
导出
摘要 文章介绍了一种异于传统DDos的攻击方式Shrew DDos,重点讨论了这种攻击的特点、攻击参数与效果。由于Shrew DDos的隐蔽性,传统的入侵检测系统很难把它和正常的数据流区分开。文章给出了一个基于数字信号处理(Digital Signal Processing,DSP)的检测方案,并对检测算法的复杂性和检测的实时性进行了讨论。 This paper introduces a kind of DDos attack method-Shrew DDoS,which is different from the traditional DDoS attack method.The characteristics,attack parameters and effects of this attack are mainly discussed.Due to the concealment of Shrew DDos,it is difficult for traditional intrusion detection systems to distinguish it from normal data flow.This paper presents a detection scheme based on DSP,and discusses the complexity of the detection algorithm and the real-time performance of the detection.
作者 赵振中 廖骏 Zhao Zhenzhong;Liao Jun(The Chinese People's Liberation Army 95794 Troops,Hubei Guangshui 432700)
机构地区 中国人民解放军
出处 《网络空间安全》 2019年第6期1-8,共8页 Cyberspace Security
关键词 DSP Shrew DDos 攻击检测 信息安全 DSP Shrew DDos attack detection information security
  • 相关文献

参考文献4

二级参考文献31

  • 1Kuzmanovic A, Knightly EW. Low-Rate TCP-targeted denial of service attacks--the shrew vs. the mice and elephants. In: Proc. of the ACM SIGCOMM 2003. New York: ACM Press, 2003. 75-86. http://byte.csc.lsu.edu/-durresi/7502/reading/p75-kuzmanovic. pdf.
  • 2Sarat S, Terzis A. On the effect of router buffer sizes on low-rate denial of service attacks. In: Proc. of the 14th Int'l Conf. on Computer Communications and Networks (ICCCN 2005). New York: IEEE Press, 200S. 281-286. http://www.cs.jhu.edu/-sarat/ ICCCN05.pdf.
  • 3Kwok YK, Tripathi R, Chen Y, Hwang K. HAWK: Halting anomalies with weighted choking to rescue well-behaved TCP sessions from shrew DDoS attacks. In: Proc. of the 3rd Int'l Conf. on Networking and Mobile Computing (ICCNMC 2005). New York: Springer-Verlag, 2005.423-432. http://gridsec.usc.edu/files/TR/HAWK-ICCNMC2005-CameraReady.pdf.
  • 4Sun H, Lui JCS, Yau DKY. Defending against low-rate TCP attacks: Dynamic detection and protection. In: Proc. of the 12th IEEE Int'l Conf. on Network Protocols (ICNP 2004). New York: IEEE Press, 2004. 196-205. http://www.cse.cuhk.edu.hk/-cslui/ PUBLICATION/icnp_lowrate.pdf.
  • 5Sun H, Lui JCS, Yau DKY. Distributed mechanism in detecting and defending against the low-rate TCP attack. Computer Networks, 2006,50(13):2312-2330.
  • 6Chen Y, Hwang K. Collaborative detection and filtering of shrew DDoS attacks using spectral analysis. Journal of Parallel and Distributed Computing, 2006,66(9): 1137-1151.
  • 7Guirguis M, Bestavros A, Matta I. Exploiting the transients of adaptation for RoQ attacks on Internet resources. In: Proc. of the 12th IEEE Int'l Conf. on Network Protocols (ICN-P 2004). New York: IEEE Press, 2004. 184-195. http://www.ieee-icnp.org/ 2004/papers/5-2.pdf.
  • 8Luo XP, Chang RKC. On a new class of pulsing denial-of-service attacks and the dcfanse, In: Proc. of the Network and Distributed System Security Symp. (NDSS 2005). Rcston: Intcrnct Society, 2005. http://www.isoc.org/isoc/confercnces/ndss/OS/proccedings/ papers/new_pulsing_DOS.pdf.
  • 9Chertov R, Fahmy S, Shroff NB. Emulation versus simulation: A case study of TCP-targeted denial of service attack. In: Proc. of the 2nd IEEE Conf. on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2006). New York: IEEE Press, 2006. http://cobweb.ecn.purdue.edu/-shroff/Shroff/conference/CheFahShr-tridentcom.pdf.
  • 10Chen Y, Hwang K. Spectral analysis of TCP flows for defense against reduction-of-quality attacks. In: Proc. of the 2007 IEEE Int'l Conf. on Communications (ICC 2007). New York: IEEE Press, 2005. 1203-1210. http://pods.binghamton.edu/-ychenfPID364015. pdf.

共引文献23

同被引文献7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部