期刊文献+

一种新的分布式拒绝服务攻击检测方法 被引量:2

A New Method for Detecting Distributed Denial-of-Service Attack
原文传递
导出
摘要 检测分布式拒绝服务(Distributed Denial-of-Service,DDoS)攻击,需要将攻击流与正常流区分开来,特别是与繁忙业务流区分。检测方法需要高效的实现,使在线实时监测成为可能。在研究DDoS攻击对网络流量自相似性影响,加之对攻击流包特征分析的基础上,采用了一种联合小波分析与特征分析的检测DDoS攻击的方法。实验表明,这种新型检测方法比传统的检测方法准确。 The detection of Distributed Denial of Service attack needs flows, especially from busy flows. An effective method must be realized in A combined method is adopted based on the research of the influence by DDoS traffics and the analysis characters of attack flow packets. The experiment is more accurate than traditional methods. distinguishing attack flows from normal order to enable the on-line detection at al tack on various self-similar network results show that the proposed method
出处 《通信技术》 2008年第11期129-130,134,共3页 Communications Technology
关键词 分布式拒绝服务攻击 小波 HURST参数 distributed denial of service wavelet Hurst
  • 相关文献

参考文献6

  • 1Robert Richardson. 2007 CSI computer crime and security survey [EB/OL]. http://i. cmpnet.com/ v2. goesi, com/ pdf/ CSISurvey 2007.
  • 2Cabrera J B D, Lewis Lundy, Qin Xinzhou, et al. Proactive Detection of Distributed Denial of Service Attacks using MIB Traffic Variables A Feasibility Study[C].In: Proceedings of International Symposium on Integrated Network Management. Seattle, WA, USA: IEEE Press, 2001:609-622.
  • 3任勋益,王汝传,王海艳.基于自相似检测DDoS攻击的小波分析方法[J].通信学报,2006,27(5):6-11. 被引量:56
  • 4Xiang Y, Lin Y, Lei W L, et al. Detecting DDoS attack based network self-similarity[J]. IEE Proceedings Communications, 2004, 151(3):292-295.
  • 5MIT Lincoln Laboratory. 2000 DARPA instrusion detection scenario specific data set[EB/OL]., http://www.11. mit. edu/ IST/ideval/data/data_index. html.
  • 6罗光春,林夏,卢显良,张骏.一种新型的基于网络流量自相似性的DDoS入侵诊测方法[J].计算机科学,2003,30(12):54-58. 被引量:3

二级参考文献14

  • 1孙钦东,张德运,高鹏.基于时间序列分析的分布式拒绝服务攻击检测[J].计算机学报,2005,28(5):767-773. 被引量:55
  • 2CHANG R K C.Defending against flooding-based distributed denial-of-service attack:a tutorial[J].IEEE Comm Magazine,2002,40(10):42-51.
  • 3LAU F,RUBIN S H,SMITH M H.Distributed denial of service attacks[A].Proceedings of the IEEE International Conference on Systems,Man,and Cybernetics[C].Nashville,2000.2275-2280.
  • 4LELAND W,TAQQU M,WILLINGER W.On the self-similar nature of Ethernet traffic (Extended Version)[J].IEEE/ACM Trans on Networking,1994,2(1):1-15.
  • 5PAXSON V,FLOYD S.Wide area traffic:the failure of poisson modeling[J].IEEE/ACM Trans on Networking,1995,3(3):226-244.
  • 6DANG T D,MOLNAR S.On the Effects of Non-Staionarity in Long Range Dependent Tests[R].Budapest Univ Technology and Economics Tech Rep,Budapest,Hungary,1999.
  • 7ABRY P,VEITCH D.Wavelet analysis of long range dependent traffic[J].IEEE Trans on Infor Theory,1998,44(1):2-15.
  • 8李弻程,罗建书.小波分析及其应用[M].北京:电子工业出版社,2003.
  • 9DAUBECHIES I.Ten Lectures on Wavelets[M].Philadelphia,PA:SIAM,1992.
  • 10蔡弘,陈惠民,李衍达.自相似业务模型——通信网络突发业务建模的新方法[J].通信学报,1997,18(11):51-59. 被引量:28

共引文献57

同被引文献12

引证文献2

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部