首页> 外文会议>International Conference on Information Technology Convergence and Services >Integrated DDoS Attack Defense Infrastructure for Effective Attack Prevention
【24h】

Integrated DDoS Attack Defense Infrastructure for Effective Attack Prevention

机译:综合DDOS攻击防御基础设施,用于预防有效攻击

获取原文

摘要

Currently attackers are trying to paralyze servers and networks with various types of DDoS attacks. For example, on 7th July in 2009, a DDoS attack occurred against 48 web sites in South Korea and U.S.A. In this attack, the attack traffic pattern and the botnet construction methods are different from that of previous version. Due to the differences of the attack patterns, the 7.7 DDoS attack was not detected easily. These days, such new types of sophisticated attacks occur and it???s not easy to detect those attacks effectively. In fact, it???s been more than ten years since DDoS attacks discovered in late 1990s. However, DDoS attack is still one of the biggest threats in Internet infrastructure and IT environment. It is because almost all the DDoS defense techniques are not focused on general characteristics and infrastructure but on specific characteristics in each attack. In order to develop a general purpose DDoS defense technology, all the attack process and general characteristics should be analyzed. Furthermore, based on the each attack phases and location of network topology also have to be analyzed. For that, in this paper, we show a general DDoS attack process and each phase in this process. For each phase, we propose DDoS attack prevention requirements and finally suggest the integrated DDoS attack defense infrastructure. For the detailed explanation, we classify attack detection techniques into three categories.
机译:目前,攻击者试图瘫痪的服务器和网络与各种类型的DDoS攻击。例如,在2009年7月7日,袭击事件发生DDoS攻击针对韩国和U.S.A. 48个网站在这种攻击中,攻击流量模式和僵尸网络建设的方法是从以前的版本不同。由于攻击模式的差异,是不容易发现的7.7 DDoS攻击。这些天来,发生这样的新类型的复杂攻击,它???不容易有效地检测这些攻击。事实上,+及其已有十余年以来DDoS攻击在1990年代后期发现的。然而,DDoS攻击依然是互联网基础设施的最大威胁和IT环境中的一个。这是因为几乎所有的DDoS防御技术不是集中在一般特性和基础设施,但在每次攻击具体特点。为了开发一个通用的DDoS防御技术,所有的攻击过程和一般特征进行分析。此外,根据每个阶段的攻击和网络拓扑结构的位置,还必须进行分析。为此,在本文中,我们展示了一个一般的DDoS攻击,并在这过程中的每个阶段。对于每一个阶段,我们提出了DDOS攻击,防要求,并最终提出了集成DDoS攻击防御基础设施。对于详细的解释,我们进行分类攻击检测技术分为三类。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号