与传统的基于低层协议的DDoS攻击相比,应用层DDoS具有更加显著的攻击效果,而且更加难以检测。现有的解决方法包括:特征检测、流量限制、隐半马尔可夫模型等。这些方法在检测应用层DDoS攻击(如,HTTP Get Flood)攻击时检测率不高或者检测...与传统的基于低层协议的DDoS攻击相比,应用层DDoS具有更加显著的攻击效果,而且更加难以检测。现有的解决方法包括:特征检测、流量限制、隐半马尔可夫模型等。这些方法在检测应用层DDoS攻击(如,HTTP Get Flood)攻击时检测率不高或者检测速度较慢。提出的基于用户浏览行为的检测方法对HTTPFlood攻击检测效果明显得到改善。展开更多
HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests.Recent research tends to detect HTTP-flooding with the anomaly-based approaches,which detect the HTTP-flooding by ...HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests.Recent research tends to detect HTTP-flooding with the anomaly-based approaches,which detect the HTTP-flooding by modeling the behavior of normal web surfers.However,most of the existing anomaly-based detection approaches usually cannot filter the web-crawling traces from unknown searching bots mixed in normal web browsing logs.These web-crawling traces can bias the base-line profile of anomaly-based schemes in their training phase,and further degrade their detection performance.This paper proposes a novel web-crawling tracestolerated method to build baseline profile,and designs a new anomaly-based HTTP-flooding detection scheme(abbr.HTTP-sCAN).The simulation results show that HTTP-sCAN is immune to the interferences of unknown webcrawling traces,and can detect all HTTPflooding attacks.展开更多
DDoS(Distributed Denial of Service)攻击防护是目前的重要热点问题之一。我们提出了一套高效率的DDoS攻击防护方法,采用了一种基于元数据大数据分析的检测系统识别DDoS攻击包,总结经验数据而形成流量控制规则,通过分流器或者是...DDoS(Distributed Denial of Service)攻击防护是目前的重要热点问题之一。我们提出了一套高效率的DDoS攻击防护方法,采用了一种基于元数据大数据分析的检测系统识别DDoS攻击包,总结经验数据而形成流量控制规则,通过分流器或者是内联设备(inline device,指内网防火墙APS,ADS或者负载均衡设备)采用了ACL(访问控制列表)进行了速率限制、流量清洗或丢包处理。我们的方法还实现了万兆流量线速处理,并且通过了运行商在网测试。总结了国内常见的主要的DDoS攻击,特别是应用型的DDoS攻击的流量特征。展开更多
文摘与传统的基于低层协议的DDoS攻击相比,应用层DDoS具有更加显著的攻击效果,而且更加难以检测。现有的解决方法包括:特征检测、流量限制、隐半马尔可夫模型等。这些方法在检测应用层DDoS攻击(如,HTTP Get Flood)攻击时检测率不高或者检测速度较慢。提出的基于用户浏览行为的检测方法对HTTPFlood攻击检测效果明显得到改善。
基金supported by National Key Basic Research Program of China(973 program)under Grant No.2012CB315905National Natural Science Foundation of China under grants 61172048,61100184,60932005 and 61201128the Fundamental Research Funds for the Central Universities under Grant No ZYGX2011J007
文摘HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests.Recent research tends to detect HTTP-flooding with the anomaly-based approaches,which detect the HTTP-flooding by modeling the behavior of normal web surfers.However,most of the existing anomaly-based detection approaches usually cannot filter the web-crawling traces from unknown searching bots mixed in normal web browsing logs.These web-crawling traces can bias the base-line profile of anomaly-based schemes in their training phase,and further degrade their detection performance.This paper proposes a novel web-crawling tracestolerated method to build baseline profile,and designs a new anomaly-based HTTP-flooding detection scheme(abbr.HTTP-sCAN).The simulation results show that HTTP-sCAN is immune to the interferences of unknown webcrawling traces,and can detect all HTTPflooding attacks.
文摘针对SYN flood防护算法中的SYN重传算法进行研究和改进,设计一种对客户访问体验影响尽可能小且能高效防护SYN flood攻击的算法。通过对SYN重传算法的缺点和用户行为进行分析,采取对源IP地址一次验证,特定时间内信任的方法,缩短用户再次访问等待时间,采取增加HTTP重定向应答报文的方法减少误转报文。实验结果表明,改进后的防护算法缩短了用户访问Web服务器的响应时间,减少了随机源IP SYN flood攻击时的误转报文情况。
文摘DDoS(Distributed Denial of Service)攻击防护是目前的重要热点问题之一。我们提出了一套高效率的DDoS攻击防护方法,采用了一种基于元数据大数据分析的检测系统识别DDoS攻击包,总结经验数据而形成流量控制规则,通过分流器或者是内联设备(inline device,指内网防火墙APS,ADS或者负载均衡设备)采用了ACL(访问控制列表)进行了速率限制、流量清洗或丢包处理。我们的方法还实现了万兆流量线速处理,并且通过了运行商在网测试。总结了国内常见的主要的DDoS攻击,特别是应用型的DDoS攻击的流量特征。