...
首页> 外文期刊>IEEE Transactions on Parallel and Distributed Systems >You can run, but you can't hide: an effective statistical methodology to trace back DDoS attackers
【24h】

You can run, but you can't hide: an effective statistical methodology to trace back DDoS attackers

机译:您可以运行,但不能隐藏:一种有效的统计方法,可追溯DDoS攻击者

获取原文
获取原文并翻译 | 示例

摘要

There is currently an urgent need for effective solutions against distributed denial-of-service (DDoS) attacks directed at many well-known Web sites. Because of increased sophistication and severity of these attacks, the system administrator of a victim site needs to quickly and accurately identify the probable attackers and eliminate the attack traffic. Our work is based on a probabilistic marking algorithm in which an attack graph can be constructed by a victim site. We extend the basic concept such that one can quickly and efficiently deduce the intensity of the "local traffic" generated at each router in the attack graph based on the volume of received marked packets at the victim site. Given the intensities of these local traffic rates, we can rank the local traffic and identify the network domains generating most of the attack traffic. We present our trace back and attacker identification algorithms. We also provide a theoretical framework to determine the minimum stable time t/sub min/, which is the minimum time needed to accurately determine the locations of attackers and local traffic rates of participating routers in the attack graph. Extensive experiments are carried out to illustrate that one can accurately determine the minimum stable time t/sub min/ and, at the same time, determine the location of attackers under various threshold parameters, network diameters, attack traffic distributions, on/off patterns, and network traffic conditions.
机译:当前,迫切需要针对许多知名网站的分布式拒绝服务(DDoS)攻击的有效解决方案。由于这些攻击的复杂性和严重性不断提高,受害站点的系统管理员需要快速而准确地识别出可能的攻击者并消除攻击流量。我们的工作基于概率标记算法,其中受害者站点可以构建攻击图。我们扩展了基本概念,以便可以根据在受害站点接收到的标记数据包的数量,快速有效地推断出攻击图中每个路由器上生成的“本地流量”的强度。鉴于这些本地流量速率的强度,我们可以对本地流量进行排名,并确定生成大部分攻击流量的网络域。我们介绍了追溯和攻击者识别算法。我们还提供了一个理论框架来确定最小稳定时间t / sub min /,这是准确确定攻击者位置以及攻击图中参与路由器的本地流量速率所需的最短时间。进行了广泛的实验,以说明可以准确确定最小稳定时间t / sub min /,并同时确定攻击者在各种阈值参数,网络直径,攻击流量分布,开/关模式,和网络流量条件。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号