期刊文献+

一种新型的基于网络流量自相似性的DDoS入侵诊测方法 被引量:3

A New Method of DDoS Intrude Detection Based on Self-Similarity of Network Traffics
在线阅读 下载PDF
导出
摘要 每年全球因计算机网络的安全系统被破坏而造成的经济损失达数百亿美元,近年来出现的分布式拒绝服务攻击(DDoS)更是使网络安全状况令人担忧. This paper presents a new method of DDoS Intrude Detection Based on Self-Similarity of Network Traffics based on analysis of parameter of self-similar, which includes Hurst parameter, Holder parameter (Time variable function H(t)), we do research on the affect of H parameter change brought by DDoS attack. And we discover the DDoS attack can be detected in some extent by measure the change of H parameter, as it showed by the research result this network traffic based method can detected DDoS attack and is more reliable on the recognition of all kinds of DDoS attack than any other method based on character recognition.
出处 《计算机科学》 CSCD 北大核心 2003年第12期54-58,共5页 Computer Science
基金 国家九七三(项目号973-1-4-2) 电子科技大学青年基金
关键词 计算机网络 网络安全 网络流量 自相似性 DDOS 入侵诊测方法 Intrude detection, DDoS, Self-similarity, Multi-fractal
  • 相关文献

参考文献3

二级参考文献7

  • 1Fan Y H,Performance analysis of ATM switches with self-similar traffic,1996年
  • 2Huang C C,ICC’95,1995年
  • 3Wang Q L,IEEE/ACM Trans on Networking,1993年,1卷,2期,230页
  • 4Huang C C,ACM Comput Commun Rev,25卷,4期,114页
  • 5蔡弘,96’中国智能自动化学术会议,1996年
  • 6蔡弘,IEEE ICIT’96,1996年
  • 7谢和平,分形应用中的数学基础与方法,1996年

共引文献44

同被引文献23

  • 1任勋益,王汝传,王海艳.基于自相似检测DDoS攻击的小波分析方法[J].通信学报,2006,27(5):6-11. 被引量:56
  • 2Robert Richardson. 2007 CSI computer crime and security survey [EB/OL]. http://i. cmpnet.com/ v2. goesi, com/ pdf/ CSISurvey 2007.
  • 3Cabrera J B D, Lewis Lundy, Qin Xinzhou, et al. Proactive Detection of Distributed Denial of Service Attacks using MIB Traffic Variables A Feasibility Study[C].In: Proceedings of International Symposium on Integrated Network Management. Seattle, WA, USA: IEEE Press, 2001:609-622.
  • 4Xiang Y, Lin Y, Lei W L, et al. Detecting DDoS attack based network self-similarity[J]. IEE Proceedings Communications, 2004, 151(3):292-295.
  • 5MIT Lincoln Laboratory. 2000 DARPA instrusion detection scenario specific data set[EB/OL]., http://www.11. mit. edu/ IST/ideval/data/data_index. html.
  • 6Lelaud W, Tagqu M, Willinger W,et al. On the Self-Similar Nature of Ethemet Traffic [ J ]. IEEE/ACM Transactions on Networking, 1994, 2( 1 ) :1-15.
  • 7Paxson V, Floyd S. Wide area traffic: the failure of Poisson modeling [ J ]. IEEE/ACM Transactions on Networking, 1995,44( 1 ) :226-244.
  • 8Paxson V, Veitch D. Wavelet Analysis of Long- Range- Dependent Traffic [ J ]. IEEE Transactions on Information Theory,1998,44(3) : 2-15.
  • 9Crovella M E, Bestavros A. Self-similarity in World Wide Web traffic : evidence and possible causes [ J ]. IEEE/ACM Transactions on Networking, 1997,5(6) : 835-846.
  • 10Willinger W, Taqqu M S, Sherman R, et al. Self- similarity through high- variability: statistical analysis Ethernet LAN traffic at the source level [J]. IEEE/ACM Transactions on Networking, 1997, 5(1) : 71- 86.

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部