Volume 30 Issue 11
Nov.  2004
Turn off MathJax
Article Contents
Fang Zhiyi, Zhang Meiwen, Wei Hua, et al. Study of new measure to recover and control DOS/DDOS atta ck[J]. Journal of Beijing University of Aeronautics and Astronautics, 2004, 30(11): 1033-1037. (in Chinese)
Citation: Fang Zhiyi, Zhang Meiwen, Wei Hua, et al. Study of new measure to recover and control DOS/DDOS atta ck[J]. Journal of Beijing University of Aeronautics and Astronautics, 2004, 30(11): 1033-1037. (in Chinese)

Study of new measure to recover and control DOS/DDOS atta ck

  • Received Date: 25 Jun 2004
  • Publish Date: 30 Nov 2004
  • DOS(denial\|of\|service)/DDOS(distributed denial\|of\|service) network attack no t only causes harm to attacked target, but also disturbs other flows that share the same network with attacked target. By adding computing into every bosom node (route, switch), a mechanism system to recover and control DOS/DDOS attack which based on active network was advanced. The mechanism system was composed of three mechanisms: cluster-based automatic identification and control mechanism, cluster-based active notify trace mechanism and administration domain based control cooperation mechanism. Cluster-based automatic identification and control mechanism included identification policy of attack cluster and rate-limit policy of controlling them. Cluster-based active notify trace mechanism will notify the characteristic of attack cluster to upstream active node and activate local rate-limit policy. Effective recovery and the control o f DOS/DDOS attack can be realized by using this system at lab.

     

  • loading
  • [1] 杨子翔, 蔡锡钧. Network DOS/DDOS攻击及预防方法之研究 . http://www.ncku.edu.tw/TANET2000/download/ A3-2,2000-10-21/2003-02 Yang Zixiang,Cai Xijun. The study of network DOS/DDOS attack and the technique of prevent . http://www.ncku.edu.tw/TANET2000/download/ A3-2,2000-10-21/2003-02(in Chinese) [2] Raul Mahajan, Sally Floyd. Controlling high-bandwidth flows at the congested router . http://www.cs.washington.edu/homes/ratul/red-pd/paper_icnp.pdf, 2000-11/2003- 02 [3]Vern Paxson. An analysis of using reflectors to defeat DoS traceback.Ausus,t2000 .ftp:ftp.ee.lbl.gov/.vp-reflectors.txt, 2000-8/2003-2 [4]Robert Stone. CenterTrack:an IP overlay network for tracking DoS floods . http://www.arbornetworks.com/downloads/research51/stone00centertrack new.pdf,2000-08/2003-02 [5]Venkatachary Srinivasan, Geroge Varhese. Faster IP lookups using controlled prefix expansion . http://ccrc.wustl.edu/~cheenu/papers/filucpe.ps,1998-02/2003-02 [6]Tennenhouse D L, Smith J M, Sincoskie W D, et al. A survey of active network research[J]. IEEE Communications Magazine, 1997,35(1):80~86
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(2385) PDF downloads(1092) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return