期刊文献+

DDoS攻击防御实验床的设计与实现 被引量:5

Design and Implementation of DDoS Attack-defense Testbed
在线阅读 下载PDF
导出
摘要 针对目前分布式拒绝服务(DDoS)的测试与评估需求,设计并实现DDoS攻击防御实验床。该实验床使用真实主机模拟网络环境,具有网络拓扑配置、背景流量和攻击流量产生、数据采集及评估与显示等功能,并提供基于Web的配置和管理界面。实验结果表明,该实验床可为DDoS的攻击与防御系统提供便利的测试与评估环境。 According to the requirement of Distributed Denial of Service(DDoS) testing and evaluation, this paper presents the design and implementation of a DDoS attack-defense testbed. This testbed uses real machines to emulate network. It provides background and DDoS attack traffic generation, network topology configuration, data acquisition, evaluation and display ability, and has a configuration and control interface based on Web. Experimental results show that this testbed provides a convenient testing and evaluation environment for DDoS attack- defense systems.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第13期118-120,共3页 Computer Engineering
关键词 分布式拒绝服务 实验床 攻击 防御 评估 Distributed Denial of Service(DDoS) testbed attack defense evaluation
  • 相关文献

参考文献5

  • 1Hardaker W, Kindred D, Ostrenga R, et al. Justification and Requirements for a National DDoS Defense Technology Evaluation Facility[R]. Network Associates Laboratories, Tech. Rep.: 02-052, 2002.
  • 2Blackert W J, Gregg D M, Castner A K, et al. Analyzing Interaction Between Distributed Denial of Service Attacks and Mitigation Technologies[C]//Proceedings of the DARPA Information Survivability Conference and Exposition. Washington D. C., USA: IEEE Press, 2003.
  • 3Benzel T, Braden R, Joseph A, et al. Experience with Deter: A Testbed for Security Research[C]//Proceedings of the 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities. Barcelona, Spain: [s. n.], 2006.
  • 4Jonathan L A. Resisting SYN Food DoS Attacks with a SYN Cache[C]//Proceedings of the BSD Conference. San Francisco, CA, USA: [s. n.], 2002.
  • 5Kim Y, Lau W C, Chuah M C, et al. PacketScore: Statistics-based Overload Control Against Distributed Denial-of-service Attacks[J]. IEEE Transactions on Dependable and Secure Computing, 2006, 3(2): 141-155.

同被引文献41

  • 1卜先锦,董文洪,沙基昌.两种C^4ISR仿真试验床集成设计方法及比较[J].情报指挥控制系统与仿真技术,2004,26(4):39-43. 被引量:1
  • 2朱智林,王竹平,陈平.小卫星柔性测试床设计与实现[J].系统工程与电子技术,2005,27(1):69-71. 被引量:1
  • 3孙钦东,张德运,高鹏.基于时间序列分析的分布式拒绝服务攻击检测[J].计算机学报,2005,28(5):767-773. 被引量:55
  • 4Floyd S,Gummadi R,Shenker S.Adaptive RED:An Algorithm for Increasing the Robustness of Red's Active Queue Management[EB/OL].(2001-08-10).http://www.icir.org/-floyd.
  • 5Feng Wuchang,Kandlur D D,Saha D,et al.The Blue Active Queue Management Algorithms[J].IEEE/ACM Trans.on Networking,2002,10(4):512-528.
  • 6Mahajan R,Bellovin S M,Floyd S,et al.Controlling High Bandwidth Aggregates in the Network[J].ACM SIGCOMM Computer Communication Review,2002,32(3):62-73.
  • 7Paxson V.An Analysis of Using Reflectors for Distributed Dnial-of-Service Attacks[J].Computer Communication Review,2001,31(3):38-47.
  • 8马志奇,龚亚信,杨宏文,胡卫东,郁文贤.算法级数据融合测试床的关键设计与实现[J].系统仿真学报,2007,19(18):4339-4341. 被引量:2
  • 9赵永利,张杰.0MNET + +与网络仿真[M].北京:人民邮电出版社,2012:3-4.
  • 10Astha Keshariya, Noria Foukia. DDoS defense meehanisms: A new taxonomy [G]. LNCS 5939: Data Privacy Manage- ment and Autonomous Spontaneous Security. Berlin.. Springer Berlin Heidelberg, 2009: 222-236.

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部