首页> 外文会议>European Signal Processing Conference >Botnet identification in randomized DDoS attacks
【24h】

Botnet identification in randomized DDoS attacks

机译:随机DDoS攻击中的僵尸网络识别

获取原文

摘要

Recent variants of Distributed Denial-of-Service (DDoS) attacks leverage the flexibility of application-layer protocols to disguise malicious activities as normal traffic patterns, while concurrently overwhelming the target destination with a large request rate. New countermeasures are necessary, aimed at guaranteeing an early and reliable identification of the compromised network nodes (the botnet). In this work we introduce a formal model for the aforementioned class of attacks, and we devise an inference algorithm that estimates the botnet hidden in the network, converging to the true solution as time progresses. Notably, the analysis is validated over real network traces.
机译:分布式拒绝服务(DDoS)攻击的最新变体利用应用程序层协议的灵活性,将恶意活动伪装成正常的流量模式,同时以高请求率压倒目标目的地。必须采取新的对策,以确保及早可靠地识别受感染的网络节点(僵尸网络)。在这项工作中,我们为上述攻击类型引入了一个正式模型,并且我们设计了一种推断算法,该算法可以估算隐藏在网络中的僵尸网络,并随着时间的推移收敛到真正的解决方案。值得注意的是,该分析是通过真实的网络轨迹进行验证的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号