首页> 外文会议> >MAFIC: adaptive packet dropping for cutting malicious flows to push back DDoS attacks
【24h】

MAFIC: adaptive packet dropping for cutting malicious flows to push back DDoS attacks

机译:MAFIC:自适应数据包丢弃,用于减少恶意流量以阻止DDoS攻击

获取原文
获取外文期刊封面目录资料

摘要

In this paper, we propose a new approach called MAFIC (malicious flow identification and cutoff) to support adaptive packet dropping to fend off DDoS attacks. MAFIC works by judiciously issuing lightweight probes to flow sources to check if they are legitimate. Through such probing, MAFIC would drop malicious attack packets with high accuracy while minimizes the loss on legitimate traffic flows. Our NS-2 based simulation indicates that MAFIC algorithm drops packets from unresponsive potential attack flows with an accuracy as high as 99% and reduces the loss of legitimate flows to less than 3%. Furthermore, the false positive and negative rates are low-only around 1% for a majority of the cases.
机译:在本文中,我们提出了一种称为MAFIC(恶意流识别和切断)的新方法来支持自适应数据包丢弃以抵御DDoS攻击。 MAFIC的工作方式是明智地向流源发出轻型探针,以检查它们是否合法。通过这种探测,MAFIC可以高精度地丢弃恶意攻击数据包,同时最大程度地减少合法流量的损失。我们基于NS-2的仿真表明,MAFIC算法以高达99%的准确度从无响应的潜在攻击流中丢弃数据包,并将合法流的损失降低到不足3%。此外,在大多数情况下,假阳性率和假阴性率很低,仅为1%左右。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号