期刊文献+

基于VTP方法的DDoS攻击实时检测技术研究 被引量:18

Real-Time Detection of DDoS Attack Based on VTP
在线阅读 下载PDF
导出
摘要 为了能及时准确检测DDoS攻击的发生,在对方差-时间图(VTP,Variance-Time Plots)方法分析的基础上,对基于VTP的实时在线计算Hurst参数技术进行了性能分析,得出了其具有高效性的结论,并利用这种技术,对MIT的林肯实验室数据进行了分析,总结出了DDoS攻击过程中,网络流量的自相似模型的Hurst参数变化规律,即DDoS攻击刚开始时,Hurst参数具有较快的上升趋势,然后在参数值很高水平的基础上具有缓慢下降趋势,直到计算Hurst参数的网络流量全部是DDoS攻击流量时,有一个突然下降的现象(从0.95以上降至0.45左右),并由此总结出一种基于Hurst参数实时检测DDoS攻击发生的技术. To detect DDoS attack accurately and in time,the performance of real-time method based on VTP was evaluated, and the effectiveness of this method is proved. Using this method to calculate the Hurst parameter of traffic data set of Lincoln Lab of MIT, the law of change of Hurst parameter during DDoS attack is found-it is that the Hurst parameter increases faster at the beginning of an attack and then it decreases slowly; while the traffic is all DDoS attack traffic, the Hurst parameter descends absolutely (from 0.95 to 0.45).So a technology of detecting DDoS attack on real-time is proposed.
出处 《电子学报》 EI CAS CSCD 北大核心 2007年第4期791-796,共6页 Acta Electronica Sinica
基金 国家自然科学基金(No.60573141 No.70271050) 江苏省自然科学基金(No.BK2005146) 江苏省高技术研究计划基金(No.BG2004004 No.BG2005037 No.BG2005038 No.BG2006001) 国家863高技术研究发展计划基金(No.2006AA01Z439) 南京市高科技项目(No.2006软资105) 现代通信国家重点实验室基金(No.9140C1101010603) 江苏省计算机信息处理技术重点实验室基金(No.kjs050001 No.kjs0606) 江苏省高校自然科学研究计划基金(No.05KJB520092)
关键词 网络安全 分布式拒绝服务攻击 实时检测 HURST参数 方差-时间图 network security DDoS real-time detection Hurst parameter VTP(Vadance-Time Plots)
  • 相关文献

参考文献13

  • 1W E Leland,M S Taqqu,W Willinger,D V Wilson,On the self-similar nature of Ethernet traffic (extended version)[J].IEEE/ACM Trans on Networking,1994,2(1):1-15.
  • 2J Beran,R Sherman,M S Traqqu,W Wifilinger.Long range dependence in variable bit rate video traffic[J].IEEE Trans on Communication,1995,43(2/3/4):1566-1579.
  • 3Paxson V,Floyd S.Wide area traffic:the failure of poisson modeling[A].Proc ACM Sigcomm'94[C].1994.257-268.
  • 4M W Garrett,W Willinger.Analysis,modeling and generation of self-similar VBR video traffic[A].Proc ACM Sigcomm' 94[C].1994.269-280.
  • 5Addie R,et al.Fractal traffic:Measurements,modeling and performance evaluation[A].In:Proc of INFOCOM' 95[C].Boston,MA,1995.977-984.
  • 6Crovella M E,Bestavros A.Self-similarity in World Wide Web traffic-evidence and possible cause[A].Proceedings of ACM Sigmetrics'96[C].160-169.
  • 7W Willinger,M S Taqqu,R Sherman,D V Wilison.Self-similarity through high-variability:statistical analysis of Ethernet LAN traffic at the source level[J].IEEE/ACM Transactions on Networking,1997,5(1):71-86.
  • 8A Veres,M Boda.The chaotic nature of TCP congestion control[A].Proceedings of the IEEE Infocom'2000[C].
  • 9B Tsybakov,N D Georganas.On self-similar traffic in ATM queues:definitions,overflow probability bound,and cell delay distribution[J].IEEE/ACM Trans on Networking,1997,5(3):397-408.
  • 10M Garrett.Contributinn toward real-time service on packet switched networks[D],Columbia University.1993.

同被引文献192

引证文献18

二级引证文献115

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部