首页> 外文会议>IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems >You can run, but you can't hide: an effective methodology to traceback DDoS attackers
【24h】

You can run, but you can't hide: an effective methodology to traceback DDoS attackers

机译:你可以运行,但你无法隐藏:一个有效的方法来回溯DDOS攻击者

获取原文

摘要

With the increase of sophistication and severity of DDoS attack, it is important for a victim site to quickly identify the potential attackers and eliminate their traffic. Our work is based on the probabilistic marking algorithm by Savage[12] in which an attack graph can be constructed by a victim site. We extend the concept further such that we can deduce the local traffic rate of each router in the attack graph based on the received marked packets. Given the intensities of these local traffic rates, we can eliminate these attackers from sending high volume of traffic to a victim site. More importantly, we propose a theoretical method to determine the minimum stable time t{sub}(min), which is the minimum time it takes to accurately determine the local traffic rate of every participating router in the attack graph.
机译:随着DDOS攻击的复杂性和严重程度的增加,受害者网站很重要,以快速识别潜在的攻击者并消除其交通。我们的作品基于Savage [12]的概率标记算法,其中攻击图可以由受害者站点构建。我们进一步扩展了概念,使得我们可以基于接收的标记数据包在攻击图中推断每个路由器的本地流量速率。鉴于这些本地交通费率的强度,我们可以消除这些攻击者向受害者网站发送大量流量。更重要的是,我们提出了一种理论方法来确定最小稳定时间t {sub}(min),这是准确确定攻击图中每一个参与路由器的本地流量速率所需的最短时间。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号