期刊文献+

基于行为分析的DDoS攻击源追踪技术研究 被引量:2

Research on DDoS Attack Source Tracking Technology Based on Behavior Analysis
在线阅读 下载PDF
导出
摘要 DDoS攻击利用IP协议的缺陷,通过消耗目标主机网络带宽及系统资源,使合法用户无法得到正常服务。由于采用源IP地址欺骗、代理等技术,现有的网络追踪技术不能有效追踪DDoS攻击源。针对取证人员开展DDoS追踪取证工作存在线索中断、取证困难等问题,提出了基于行为分析的DDoS攻击源追踪技术。它采用随机Petri网对DDos攻击行为进行建模,分析DDoS攻击行为的特征,通过与历史攻击行为进行匹配分析,确定可疑的攻击组织,结合攻击行为的主要特性对攻击源进行重点追踪并取证分析。通过案例对基于行为分析的DDoS攻击源追踪方法进行了分析和说明,并与其他方法进行了比较。进一步拓宽了DDoS攻击源追踪方法,通过与目前攻击源追踪技术相结合,能够提升DDoS攻击源追踪效率。 DDoS attack takes advantage of the defect of IP protocol,by consuming network bandwidth and system resources of the target host,so that legitimate users cannot receive normal services.Due to the use of source IP address spoofing,proxy and other technologies,the existing network tracking technologies cannot effectively trace the source of DDoS attacks.In order to solve the problems of clue interruption and difficulty in forensics in DDoS tracking,this paper proposes a DDoS attack source tracking technology based on behavior analysis.It uses random Petri nets to model DDoS attack behaviors,analyzes the characteristics of DDoS attack behaviors,and conducts matching analysis with historical attack behaviors to identify suspicious attack organizations,and focuses on tracking attack sources and forensics analysis of attack source based on the main characteristics of attack behavior.This paper analyzes and illustrates the source tracking method of DDoS attack based on behavior analysis and compares it with other methods.The method of tracing DDoS attack sources has been further expanded,and can improve the DDoS attack source tracking efficiency by combining with the current attack source tracking technology.
作者 张志强 刘三满 曹敏 ZHANG Zhi-qiang;LIU San-man;CAO Min(Shanxi Police College,Shanxi Taiyuan 030401)
机构地区 山西警察学院
出处 《山西警察学院学报》 2020年第1期120-123,共4页 Journal of Shanxi Police College
基金 山西省“1331工程”重点学科建设计划项目(1331KSC) 山西警察学院院级科研项目“基于云计算技术的网络攻防演练环境快速构建技术研究”和山西警察学院创新团队建设计划项目资助
关键词 DDOS攻击 IP追踪 攻击源定位 随机PETRI网 DDoS attack IP tracking location of attack source random Petri net
  • 相关文献

参考文献12

二级参考文献78

  • 1陈周国,蒲石,祝世雄.匿名网络追踪溯源综述[J].计算机研究与发展,2012,49(S2):111-117. 被引量:14
  • 2郜秋娟.利用反弹服务器进行DDoS攻击的分析与防范[J].现代电子技术,2004,27(18):56-57. 被引量:3
  • 3林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 4林闯,王元卓,杨扬,曲扬.基于随机Petri网的网络可信赖性分析方法研究[J].电子学报,2006,34(2):322-332. 被引量:43
  • 5Sheyner O,Haines J,Jha S,Lippmann R,Wing J.Automated generation and analysis of attack graphs//Proceedings of the 2002 IEEE Symposium on Security and Privacy.Berkeley,CA,2002:273-284.
  • 6Jha S,Sheyner O,Wing J M.Two formal analyses of attack graphs//Proceedings of the Computer Security Foundations Workshop (CSFW).Cape Breton,Nova Scotia,2002:49-63.
  • 7Ramakrishnan C R,Sekar R.Model-based analysis of configuration vulnerabilities.Journal of Computer Security (JCS),2002,10(1/2):189-209.
  • 8Besson F,Jensen J,Métayer D L,Thorn T.Model checking security properties of control flow graphs.Computer Security,2001,9(3):217-250.
  • 9Ritchey R,Ammann P.Using model checking to analyze network vulnerabilities//Proceedings of the IEEE Symposium on Security and Privacy.Oakland,California,2001:156-165.
  • 10Wang D,Madan B,Trivedi K S.Security analysis of SITAR intrusion-tolerant system//Proceedings of the ACM Workshop Survivable and Self-Regenerative Systems.Fairfax,VA,2003:23-32.

共引文献173

同被引文献11

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部