【24h】

An Effective Approach to Detect DDos Attack

机译:一种检测DDOS攻击的有效方法

获取原文

摘要

TCP connection is a connection oriented, reliable service. It uses 3 way handshake process to establish the connection. Distributed Denial of Service (DDoS) has emerged as one of the major threats to network security as evident from a series of attacks that shutdown some of the most popular websites. This attack prevents legitimate users from accessing the regular internet services by exhausting the victim's resources, and TCP SYN flooding attack is the most common type of DDoS attack. TCP SYN flooding exploits the TCP's 3-way handshake mechanism and its limitation in maintaining half open connection. The SYN flooding attack is very hard to detect, because it is difficult to distinguish between legitimate SYN packets and attack SYN packets at the victim's server. This paper concentrates on the different IP spoofing techniques like Random spoofed source address, Subnet spoofed source address, Fixed spoofed source address and the schemes to detect the DDoS attack. The different schemes are SYN-dog, SYN-cache, SYN-cookies. These schemes are effective only up to a particular extent. This paper concentrates more on a newly proposed scheme which is a router based scheme that uses Counting Bloom Filter algorithm and CUSUM algorithm. The new scheme is highly sensitive and always require a shorter time for the detection of both low intensity and high intensity attacks.
机译:TCP连接是面向连接,可靠的服务。它使用3种方式握手过程来建立连接。分布式拒绝服务(DDOS)已成为从一系列最受欢迎的网站关闭的一系列攻击中的网络安全的主要威胁之一。此攻击通过耗尽受害者的资源,防止合法用户访问常规互联网服务,而TCP SYN泛滥攻击是最常见的DDOS攻击类型。 TCP SYN洪水利用TCP的三通握手机制及其在维持半开连接方面的限制。 SYN泛洪攻击非常难以检测,因为很难区分合法的SYN数据包和受害者服务器的攻击SYN数据包。本文集中在不同的IP欺骗技术上,如随机欺骗源地址,子网欺骗源地址,固定欺骗源地址以及检测DDOS攻击的方案。不同的方案是Syn-Dog,Syn-Cache,Syn-Cookie。这些方案仅适用于特定程度。本文以一种新的计划集中精力,该方案是一种基于路由器的方案,该方案使用计数盛开滤波算法和CUSUM算法。新方案非常敏感,始终需要更短的时间来检测低强度和高强度攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号