首页 | 本学科首页   官方微博 | 高级检索  
     

The Detection and Orientation Method to DRDoS Attack Based on Fuzzy Association Rules
引用本文:Xinyu Yang Wenjing Yang Yi Shi Yage Gong. The Detection and Orientation Method to DRDoS Attack Based on Fuzzy Association Rules[J]. 通讯和计算机, 2006, 3(8): 1-10
作者姓名:Xinyu Yang Wenjing Yang Yi Shi Yage Gong
作者单位:[1]Department of Computer Science and Technology, Xi' an Jiaotong University, Xi'an 710049, China [2]Xi'an Communication Institute, Xi'an 710106, China
摘    要:DDoS (Distributed Denial of Service) attack is being the most extensive danger and difficulty to defense. A new kind of DDoS attack named DRDoS (Distributed Reflector Denial of Service) appears in recent years, which is more dangerous than DDoS attack because it is in stronger disguise. In this paper, the principle of DRDoS attack is studied and the network traffic is analyzed by fuzzy association rules with path restricted when DRDoS attack happens. And the association rules about spoofed network traffic and attack network traffic are mined. Also the DRDoS Attack Defensive Architecture based on Multi-Agent (D2AMA) is set up in order to realize the detection, orientation and defensive function. D2AMA is validated by NS-2 platform. It can detect and orient the attack source in a short time, realize scrvvning the attack source and stop transmitting attack traffic. The experimental result proves that D2AMA can find out the attack, orient the attack source and hold out the attack effectively.


The Detection and Orientation Method to DRDoS Attack Based on Fuzzy Association Rules
Abstract:
Keywords:DDoS   DRDoS   Fuzzy Association Rules
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号