【24h】

Network Visibility-aware Blacklist Generation

机译:网络可见性感知黑名单生成

获取原文

摘要

Volumetric Distributed Denial of Service (DDoS) attacks have become a major concern for network operators, as they endanger the network stability by causing severe congestion. Access Control Lists (ACLs), and especially blacklists, have been widely studied as a way of distributing filtering mechanisms at network entry points to alleviate the effect of DDoS attacks. Different blacklist generation approaches, as proposed in the literature, are dependent on the information available on the network traffic. Nonetheless, the collection of traffic information comes at a cost that increases with the level of detail. To study the impact of the level of detail available, we formulate three scenarios. Each scenario describes a typical collection granularity used by operators. We then define blacklist generation algorithms corresponding to each granularity. Scenarios are evaluated with a mix of real legitimate and generated attack traffic. The evaluation shows that the amount of information does have an impact on the attack filtering results, and that one should choose the blacklist generation algorithms in regard of the available level of detail. Experiments also show that having more information does not always translate to more efficient filtering.
机译:VolumeTric分布式拒绝服务(DDOS)攻击已成为网络运营商的主要关注点,因为它们通过引起严重拥堵来危及网络稳定性。访问控制列表(ACL)和尤其是黑名单,已被广泛地研究作为在网络入口点分发过滤机制以减轻DDOS攻击的影响。如文献中提出的,不同的黑名单生成方法取决于网络流量上可用的信息。尽管如此,交通信息的集合以细节水平增加而增加。为研究可用细节水平的影响,我们制定了三种情况。每种情况都描述了操作员使用的典型收集粒度。然后,我们定义对应于每个粒度的黑名单生成算法。使用实际合法和生成的攻击流量的混合进行评估。评估表明,信息量确实对攻击过滤结果产生了影响,并且应该选择在可用细节水平的黑名单生成算法。实验还表明,具有更多信息并不总是转化为更有效的过滤。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号