首页 | 本学科首页   官方微博 | 高级检索  
     

基于流量行为特征的DoS&DDoS攻击检测与异常流识别
引用本文:周颖杰,焦程波,陈慧楠,马力,胡光岷.基于流量行为特征的DoS&DDoS攻击检测与异常流识别[J].计算机应用,2013,33(10):2838-2841.
作者姓名:周颖杰  焦程波  陈慧楠  马力  胡光岷
作者单位:1. 四川大学 计算机学院, 成都 6100652. 电子科技大学 光纤传感与通信教育部重点实验室,成都 6117313. 北京信息技术研究所,北京100093
基金项目:国家自然科学基金资助项目
摘    要:针对现有方法仅分析粗粒度的网络流量特征参数,无法在保证检测实时性的前提下识别出拒绝服务(DoS)和分布式拒绝服务(DDoS)的攻击流这一问题,提出一种骨干网络DoS&DDoS攻击检测与异常流识别方法。首先,通过粗粒度的流量行为特征参数确定流量异常行为发生的时间点;然后,在每个流量异常行为发生的时间点对细粒度的流量行为特征参数进行分析,以找出异常行为对应的目的IP地址;最后,提取出与异常行为相关的流量进行综合分析,以判断异常行为是否为DoS攻击或者DDoS攻击。仿真实验的结果表明,基于流量行为特征的DoS&DDoS攻击检测与异常流识别方法能有效检测出骨干网络中的DoS攻击和DDoS攻击,并且在保证检测实时性的同时,准确地识别出与攻击相关的网络流量

关 键 词:异常检测    异常流识别    骨干网络    信息熵    流量分析
收稿时间:2013-04-10
修稿时间:2013-05-17

Traffic behavior feature based DoS&DDoS attack detection and abnormal flow identification for backbone networks
ZHOU Yingjie , JIAO Chengbo , CHEN Huinan , MA Li , HU Guangmin.Traffic behavior feature based DoS&DDoS attack detection and abnormal flow identification for backbone networks[J].journal of Computer Applications,2013,33(10):2838-2841.
Authors:ZHOU Yingjie  JIAO Chengbo  CHEN Huinan  MA Li  HU Guangmin
Affiliation:1. College of Computer Science, Sichuan University, Chengdu Sichuan 610065, China;2. Laboratory of Optical Fiber Sensing and Communications, Ministry of Education,University of Electronic Science and Technology of China, Chengdu Sichuan 611731, China;3. Beijing Information Technology Institute, Beijing 100093, China
Abstract:The existing methods for backbone networks only analyze coarse-grained network traffic characteristic parameters. Thus, they cannot guarantee both the premise of abnormal flow identification and the real-time detection for DoS (Denial of Service) & DDoS (Distributed Denial of Service, DDoS) attacks. Concerning this problem, a DoS&DDoS attack detection and abnormal flow identification method for backbone networks was proposed. First, it analyzed coarse-grained network traffic characteristic parameters to determine the time points that abnormal behaviors occur; then, fine-grained traffic behavior characteristic parameters were analyzed in these time points to find the destination IP addresses that correspond to abnormal behaviors; finally, comprehensive analysis was conducted for extracted traffic that correspond to abnormal behaviors to determine DoS and DDoS attacks. The simulation results show that, the proposed method can effectively detect DoS attacks and DDoS attacks in backbone networks. Meanwhile, it could accurately identify the abnormal traffic, while real-time detection is ensured.
Keywords:anomaly detection  abnormal flow identification  backbone network  entropy  traffic analysis
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号