首页> 外文会议>2012 Third International Conference on Computing Communication amp; Networking Technologies. >An efficient detection of flooding attacks to Internet Threat Monitors (ITM) using entropy variations under low traffic
【24h】

An efficient detection of flooding attacks to Internet Threat Monitors (ITM) using entropy variations under low traffic

机译:使用低流量下的熵变化来有效检测对Internet威胁监视器(ITM)的洪泛攻击

获取原文
获取原文并翻译 | 示例

摘要

The Internet Threat Monitoring (ITM),is a globally scoped Internet monitoring system whose goal is to measure, detect, characterize, and track threats such as distribute denial of service(DDoS) attacks and worms. To block the monitoring system in the internet the attackers are targeted the ITM system. In this paper we address flooding attack against ITM system in which the attacker attempt to exhaust the network and ITM's resources, such as network bandwidth, computing power, or operating system data structures by sending the malicious traffic. We propose an information-theoretic frame work that models the flooding attacks using Botnet on ITM. Based on this model we generalize the flooding attacks and propose an effective attack detection and Traceback using Entropy by calculating the entropy variations between normal and attack traffic.
机译:Internet威胁监视(ITM)是全球范围内的Internet监视系统,其目标是测量,检测,表征和跟踪威胁,例如分发拒绝服务(DDoS)攻击和蠕虫。为了阻止Internet上的监视系统,攻击者将ITM系统作为攻击目标。在本文中,我们针对ITM系统进行泛洪攻击,攻击者试图通过发送恶意流量来耗尽网络和ITM资源,例如网络带宽,计算能力或操作系统数据结构。我们提出了一种信息理论框架,该模型可以在ITM上使用僵尸网络对泛洪攻击进行建模。在此模型的基础上,我们对泛洪攻击进行了概括,并通过计算正常流量和攻击流量之间的熵变化,提出了一种有效的利用熵的攻击检测和回溯。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号