首页> 外文会议> >You can run, but you can't hide: an effective methodology to traceback DDoS attackers
【24h】

You can run, but you can't hide: an effective methodology to traceback DDoS attackers

机译:您可以运行,但不能隐藏:追溯DDoS攻击者的有效方法

获取原文

摘要

With the increase of sophistication and severity of DDoS (distributed denial of service) attack, it is important for a victim site to quickly identify the potential attackers and eliminate their traffic. Our work is based on the probabilistic marking algorithm by Savage et al. (2000) in which an attack graph can be constructed by a victim site. We extend the concept further such that we can deduce the local traffic rate of each router in the attack graph based on the received marked packets. Given the intensities of these local traffic rates, we can eliminate these attackers from sending high volumes of traffic to a victim site. More importantly, we propose a theoretical method to determine the minimum stable time t/sub min/, which is the minimum time it takes to accurately determine the local traffic rate of every participating router in the attack graph.
机译:随着DDoS(分布式拒绝服务)攻击的复杂性和严重性的提高,对于受害站点而言,快速识别潜在的攻击者并消除其流量非常重要。我们的工作基于Savage等人的概率标记算法。 (2000年),其中可以由受害站点构建攻击图。我们进一步扩展了概念,以便我们可以根据接收到的标记数据包在攻击图中推断出每个路由器的本地流量速率。考虑到这些本地流量的强度,我们可以消除这些攻击者向受害站点发送大量流量的情况。更重要的是,我们提出了一种理论方法来确定最小稳定时间t / sub min /,这是准确确定攻击图中每个参与路由器的本地流量所花费的最短时间。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号