留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

多管理域合作检测DDoS攻击的一个方法

苏衡 鞠九滨

苏衡, 鞠九滨. 多管理域合作检测DDoS攻击的一个方法[J]. 北京航空航天大学学报, 2004, 30(11): 1106-1110.
引用本文: 苏衡, 鞠九滨. 多管理域合作检测DDoS攻击的一个方法[J]. 北京航空航天大学学报, 2004, 30(11): 1106-1110.
Su Heng, Ju Jiubin. Method of cooperative detecting DDoS attacks across multiple domains[J]. Journal of Beijing University of Aeronautics and Astronautics, 2004, 30(11): 1106-1110. (in Chinese)
Citation: Su Heng, Ju Jiubin. Method of cooperative detecting DDoS attacks across multiple domains[J]. Journal of Beijing University of Aeronautics and Astronautics, 2004, 30(11): 1106-1110. (in Chinese)

多管理域合作检测DDoS攻击的一个方法

基金项目: 国家自然科学基金资助项目(90204014); 吉林省自然科学 基金资助项目(20030516-2)
详细信息
  • 中图分类号: TP 39308

Method of cooperative detecting DDoS attacks across multiple domains

  • 摘要: 为有效地防御分布式拒绝服务 DDoS(Distributed Denial of Service) 的 攻击,提出了基于多域间入侵检测系统 IDSs(Intrusion Detection Systems) 合作的攻击检测模型.围绕重要网络资源,构建了以〈路由器,IDS〉对为基础的闭合的IDS 合作环,通过环上节点间信息共享和合作组内的警报关联分析,能够在DDoS攻击数据包汇聚成致命攻击流之前捕获攻击特征并采取相关措施.提出了合作环组织方式、共享信息交换方式、警报关联算法以及各节点系统逻辑结构.利用原型多域合作入侵检测 MDCI(Multiple Domains Cooperative Intrusion-detection)系统实施了DDoS攻击实验,针对实验数据分析可以看出,合作环模型有效地提高了IDS系统对DDoS攻击的预警速度.

     

  • [1] Polla D, McConnell J, Frincke D, et al. A framework for cooperative intrus ion detection . In:Proceedings of the 21st National Information Systems Sec urity Conference . Virginia, 1998. 361~373 [2]Koutepas G, Stamatelopoulos F, Hatzigiannakis V, et al. An adaptable inter-domain infrastructure against DoS attacks . In:Proceedings of the International Conference on Advances in Infrastructure for e-Business, e-Education, e-Science, e-Medicine, and Mobile Technologies on the Internet . L'Aquila, 2003 [3]Moore D, Geoffrey M, Voelker. Inferring internet denial-of service activity . In:Proceedings of the 10th USENIX Security Symposium . Washington, D C, 2001 [4]Giles K E, Marchette D J, Priebe C E. On the spectral analysis of backscatter data . In:Proceedings of the Hawaii International Conference on Statistics, Mathematics, and Related Fields . Hawaii, 2004 [5]Mutaf P. Defending against a denial-of-service attack on TCP . In:Proceedings of the 2nd International Workshop on Recent Advances in Intrusion Detection . Indiana, 1999 [6]Janakiraman R, Waldvogel M, Zhang Qi. Indra:A peer-to-peer approach to network intrusion detection and prevention . In:Proceedings of the Twelfth International Workshop on Enabling Technologies:Infrastructure for Collaborati ve Enterprises . Linz, 2003. 226~230 [7]Krügel C, Toth T. Distributed pattern detection for intrusion detection . In:Proceedings of the Network and Distributed System Security Symposium (NDSS), Internet Society . California, 2002 [8]Valdes A, Skinner K. Probabilistic alert correlation . In:Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection . Davis, 2001. 54~68 [9] 杨余旺,杨静宇,孙亚民.分布式拒绝服务(DDoS)攻击的实现机理及其防御研究[J]. 计算机安全, 2003, 4(4):30~34 Yang Yuwang, Yang Jingyu, Sun Yamin. Research on mechanism of DDoS attack and defense[J]. Journal of Network & Computer Security, 2003, 4(4):30~34(in Chinese)
  • 加载中
计量
  • 文章访问数:  3396
  • HTML全文浏览量:  342
  • PDF下载量:  690
  • 被引次数: 0
出版历程
  • 收稿日期:  2004-06-25
  • 网络出版日期:  2004-11-30

目录

    /

    返回文章
    返回
    常见问答