首页> 外文期刊>The Computer journal >An efficient distributed algorithm to identify and traceback DDoS traffic
【24h】

An efficient distributed algorithm to identify and traceback DDoS traffic

机译:一种高效的分布式算法,用于识别和追溯DDoS流​​量

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

Distributed denial-of-service attack is one of the most pressing security problems that the Internet community needs to address. Two major requirements for effective traceback are (i) to quickly and accurately locate potential attackers and (ii) to filter attack packets so that a host can resume the normal service to legitimate clients. Most of the existing IP traceback techniques focus on tracking the location of attackers after-the-fact. In this work, we provide an efficient methodology for locating potential attackers who employ the flood-based attack. We propose a distributed algorithm so that a set of routers can correctly (in a distributed sense) gather statistics in a coordinated fashion and that a victim site can deduce the local traffic intensities of all these participating routers. We prove the correctness of our distributed algorithm, and given the collected statistics, we provide a method for the victim site to locate attackers who sent out dominating flows of packets. The proposed distributed traceback methodology can also complement and leverage on the existing ICMP traceback so that a more efficient and accurate traceback can be obtained. We carry out simulations to illustrate that the proposed methodology can locate the attackers in a short period of time. Moreover, the applications as well as the limitations of the proposed methodology are covered. We believe this work also provides the theoretical foundation on how to correctly and accurately perform distributed measurement and traffic estimation on the Internet.
机译:分布式拒绝服务攻击是Internet社区需要解决的最紧迫的安全问题之一。有效回溯的两个主要要求是(i)快速准确地定位潜在的攻击者,以及(ii)过滤攻击数据包,以便主机可以恢复对合法客户端的正常服务。现有的大多数IP跟踪技术都集中于事后跟踪攻击者的位置。在这项工作中,我们提供了一种有效的方法来查找采用基于洪灾的攻击的潜在攻击者。我们提出一种分布式算法,以便一组路由器可以正确地(以分布式方式)以协调的方式收集统计信息,并且受害站点可以推断所有这些参与路由器的本地流量强度。我们证明了分布式算法的正确性,并根据收集到的统计数据,为受害站点提供了一种方法,以找到发送主要数据包流的攻击者。所提出的分布式回溯方法还可以补充和利用现有的ICMP回溯,从而可以获得更有效和准确的回溯。我们进行了仿真,以说明所提出的方法可以在短时间内找到攻击者。而且,涵盖了所提出的方法的应用以及局限性。我们相信这项工作也为如何正确和准确地执行Internet上的分布式测量和流量估计提供了理论基础。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号