首页> 外文期刊>International journal of information system modeling and design >Security Integration in DDoS Attack Mitigation Using Access Control Lists
【24h】

Security Integration in DDoS Attack Mitigation Using Access Control Lists

机译:使用访问控制列表的DDoS攻击缓解中的安全集成

获取原文
获取原文并翻译 | 示例
           

摘要

In this article, the authors propose a DDoS mitigation system through access list-based configurations, which are deployed at the ISP (Internet Service Provider's) edge routers to prohibit DDoS attacks over ISPs' networks traffic. The effectiveness of the proposed system relies heavily on the willingness of ISPs in implementing the system. Once each ISP implements the system, most attacks can easily be stopped close to their point of origin. The main challenge is to implement such a system with the fixed amount of memory and available processing power with routers. A coordinated effort by participating ISPs filters out attacks close to their source, reducing the load on other routers. The suspicious traffic is first filtered out based on their source IP address. The authors also implemented the WRED algorithm for their case and conduct GNS3 experiments in a simulated environment.
机译:在本文中,作者提出了一种基于访问列表的配置的DDoS缓解系统,该系统部署在ISP(Internet服务提供商)的边缘路由器上,以禁止对ISP网络流量的DDoS攻击。拟议系统的有效性在很大程度上取决于ISP实施该系统的意愿。一旦每个ISP实施了系统,大多数攻击就可以在其起源附近轻易地被阻止。主要挑战是用路由器实现具有固定数量的内存和可用处理能力的系统。参与ISP的共同努力可以过滤掉源头附近的攻击,从而减轻其他路由器的负担。首先根据可疑流量的源IP地址将其过滤掉。作者还为他们的案例实现了WRED算法,并在模拟环境中进行了GNS3实验。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号