首页> 外文期刊>電子情報通信学会技術研究報告. 通信方式. Communication Systems >Traceroute based Target Link Flooding Attack Detection Scheme by Analyzing Hop Count to the Destination
【24h】

Traceroute based Target Link Flooding Attack Detection Scheme by Analyzing Hop Count to the Destination

机译:基于Traceroute的目标链路泛洪攻击检测方案通过分析到目的地

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

Recently, the detection of target link flooding attack which is a new type of DDoS (Distributed Denial of Service) is required. Among several schemes for target link flooding attack, the scheme focusing on traceroute is gathering attention. That scheme detects the attack by finding rapid increase of traceroute. However, it cannot work when attacker's traceroute ratio is low. In this paper, we propose traceroute-based target link flooding attack detection scheme by analyzing hop count to the destination. By analyzing the number of traceroutes per hop counts, the change can be emphasized. By computer simulations, we show that our scheme has more robustness compared with the conventional scheme.
机译:最近,需要检测目标链接泛滥攻击,这是一种新型DDO(分布式拒绝服务)。 在目标链路洪水攻击的几个方案中,专注于Traceroute的方案正在收集关注。 该方案通过发现Traceroute的快速增长来检测攻击。 但是,当攻击者的Traceroute比率低时,它无法工作。 在本文中,我们提出了基于Traceroute的目标链路泛洪攻击攻击检测方案,分析到目的地。 通过分析每跳计数的示踪数量,可以强调变化。 通过计算机模拟,我们表明,与传统方案相比,我们的方案具有更多的鲁棒性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号