首页> 外文会议>APAN第24届亚太高速网络会议 >The Effects of Filtering Malicious Traffic under DoS Attacks
【24h】

The Effects of Filtering Malicious Traffic under DoS Attacks

机译:DoS攻击对恶意流量的过滤效果

获取原文

摘要

Denial-of-Service (DoS) attacks typically generate huge amount of adverse traffic to a target server and make the server unavailable for services. Several works had put lots of efforts to find novel and effective techniques to detect and prevent such attacks. However, most studies were conducted using offline data or via simulation. Only a few studies address the issues of server survivability when under DoS attacks and perform real experiments to measure the effectiveness of filtering such malicious traffic since capturing and analyzing real attacking traffic on die fly would be an enormous task.This paper proposes a model to measure the effectiveness of filtering malicious traffic while actual attacks aim at a target server. The model performs a simple anomaly detection using the rates of input traffic which is classified into normal, suspicious and malicious traffic based on the pre-defined threshold values. If the input traffic is regarded as suspicious or malicious, the model will substantially drop part of the input traffic to an acceptable level so that only the small amount of traffic is allowed to pass and reach the target server. As a result, the server survives the attacks.We implemented the proposed model in Snort In-line on which we modified the traffic analysis module for classifying input traffic. We also added a new traffic control module for dropping malicious traffic. In the experiments, we generated real attacks on a web server with various attacking rates and filtering rates, and measured the timeout of the target server while a normal client periodically accessed the server. The timeout of the server indicates the server survivability and in turn tells us the effectiveness of filtering rates applied. The experimental results show that if the filtering rate is higher, the server will have the longer timeout In addition, if the attacking rate is higher, the W server will crash faster, or have the shorter timeout In conclusion, the proposed work shows the effectiveness of traffic filtering to the survivability of a target server.
机译:拒绝服务(DoS)攻击通常会向目标服务器生成大量不利的流量,并使该服务器不可用于服务。几项工作已竭尽全力,以发现新颖和有效的技术来检测和预防此类攻击。但是,大多数研究是使用离线数据或通过模拟进行的。只有很少的研究解决了在DoS攻击下服务器生存能力的问题,并进行了真实的实验来衡量过滤此类恶意流量的有效性,因为实时捕获和分析实际的攻击流量将是一项艰巨的任务。 本文提出了一种模型,该模型可衡量在实际攻击针对目标服务器时过滤恶意流量的有效性。该模型使用输入流量的速率执行简单的异常检测,该速率根据预定义的阈值分为正常流量,可疑流量和恶意流量。如果输入流量被认为是可疑或恶意的,则该模型会将输入流量的一部分基本降至可接受的水平,从而仅允许少量流量通过并到达目标服务器。结果,服务器可以抵抗攻击。 我们在Snort In-line中实施了建议的模型,在此模型上我们修改了流量分析模块以对输入流量进行分类。我们还添加了一个新的流量控制模块,用于丢弃恶意流量。在实验中,我们以不同的攻击率和过滤率在Web服务器上生成了真实的攻击,并在正常客户端定期访问该服务器时测量了目标服务器的超时。服务器的超时表明服务器的生存能力,进而告诉我们所应用的过滤速率的有效性。实验结果表明,过滤率越高,服务器的超时时间越长;攻击率越高,W服务器的崩溃速度越快;超时时间越短。流量过滤对目标服务器的生存能力的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号