首页> 外文OA文献 >Defending against Distributed Denial of Service Attack Under Tunnel Based Forwarding
【2h】

Defending against Distributed Denial of Service Attack Under Tunnel Based Forwarding

机译:基于隧道转发的分布式拒绝服务攻击防御

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Today, attacks are a harmful element of the computer networks. Distributed Denial of Service (DDoS) attack is one of the most harmful attacks. Many defense mechanisms have been proposed to mitigate the effect of the attacks. 2In this thesis, we study two methods for defending against DDoS attacks. First, we identify the attack packets to detect a DDoS attack by checking the TTL value of incoming packets and monitoring the number of new source IP addresses of incoming packets. Second, we propose an algorithm to traceback the attack traffic to identify the source IP address of origin by deploying a tunneling based protocol. The tunneling based protocol is called the Locator/Identifier Separation Protocol (LISP) and it is deployed in a domain network to encapsulate all outgoing packets decapsulate all incoming packets. As a side-effect the tunneling protocol reveals the ingress point of attack traffic. We also analyzed the approach in a simulation environment and compare the results in the domain network when deploying the tunneling based protocol.
机译:如今,攻击已成为计算机网络的有害因素。分布式拒绝服务(DDoS)攻击是最有害的攻击之一。已经提出了许多防御机制来减轻攻击的影响。 2本文研究了两种防御DDoS攻击的方法。首先,我们通过检查传入数据包的TTL值并监视传入数据包的新源IP地址的数量,来识别攻击数据包以检测DDoS攻击。其次,我们提出了一种算法,可以通过部署基于隧道的协议来追溯攻击流量,以识别源的源IP地址。基于隧道的协议称为定位器/标识符分离协议(LISP),它部署在域网络中以封装所有传出的数据包,并解封装所有传入的数据包。作为副作用,隧道协议揭示了攻击流量的入口点。我们还分析了在仿真环境中的方法,并在部署基于隧道的协议时在域网络中比较了结果。

著录项

  • 作者

    Keshvari Ghalati Firoozeh;

  • 作者单位
  • 年度 2011
  • 总页数
  • 原文格式 PDF
  • 正文语种 en
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号