计算机科学 ›› 2013, Vol. 40 ›› Issue (9): 99-102.

• 信息安全 • 上一篇    下一篇

一种DRDoS协同防御模型研究

张明清,揣迎才,唐俊,孔红山   

  1. 信息工程大学 郑州450004;信息工程大学 郑州450004;信息工程大学 郑州450004;信息工程大学 郑州450004
  • 出版日期:2018-11-16 发布日期:2018-11-16

Study on Collaborative Defence Model of DRDoS

ZHANG Ming-qing,CHUAI Ying-cai,TANG Jun and KONG Hong-shan   

  • Online:2018-11-16 Published:2018-11-16

摘要: 针对现有DRDoS防御方法反应滞后和过滤不全面的问题,基于协同防御思想,提出了一种DRDoS协同防御模型——HCF-AST。该方法通过协同式自学习算法,实现设备间DRDoS防御知识的共享,过滤来自外网的攻击流量;并引入入侵追踪技术,与入侵检测和过滤技术协同,定位并阻断内网攻击源。仿真结果表明,该模型能够及时发现并有效消除来自内外网的DRDoS攻击。

关键词: DRDoS攻击,协同防御,自学习,入侵追踪,HCF-AST模型 中图法分类号TP391.9文献标识码A

Abstract: According to the defects of existing defence method on response lag and incomprehensive filtering,one collabo-rative defence model of DRDoS was proposed,based on collaborative defence theory.A collaborative self-learning algorithm was designed,which made it possible to share defence knowledge with other agents and could filter attack flows from external network.Intrusion tracking technology was used,together with intrusion detection and intrusion filtering,attack source in the internal network would be located and blocked.Simulation results show that this model could timely detect and effectively eliminate attack flows from both Internal and external network.

Key words: DRDoS attack,Collaborative defence,Self-learning,Intrusion tracking,HCF-AST model

[1] 严芬,高玉龙,殷新春.DDoS攻击检测进展研究[J].苏州大学学报:自然科学版,2011,7(13):35-41
[2] Peng T.Detecting reflector attacks by sharing beliefs[J].IEEE Global Telecommunication Conference,2003,6:1358-1362
[3] Jin C,Wang H,Shin K,et al.An effective defense againstspoofedtraffic[C]∥ACM International Conference on Computerand Communications Confercnce Security.2003,0:30-41
[4] Noureldien N A,Osinan I M.A stateful inspection module architecture[C]∥IEEE/RENCON.2000,2:259-265
[5] Tsunoda H,Ohm K,Yamamoto A,et al.Detecting DDoS attacks by a simple response packet confirmation mechanism[J].Computer Communications,2008:3299-3306
[6] 何雪妮.一种改进的DRDoS检测算法[J].自动化与仪器仪表,2012,1(3):150-151,5
[7] Wang Hai-ning,Jin Cheng,Shin K G.Defense against spoofed IP traffic using hop-count filtering[J].IEEE/ACM Trans on Networking,2000,15(1):40-53
[8] 张永花,崔永君.DRDoS攻击及其防御技术研究[J].计算机安全,2009,4:53-55
[9] Mitzenmacher M,Upfal E.Probability and Computing,Rando-mized Algorithms and Probabilitic Analysis[M].Cambridge:Cambridge University Press,2005:217-223

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!