首页> 外文OA文献 >DDoS Attacks with Randomized Traffic Innovation: Botnet Identification Challenges and Strategies
【2h】

DDoS Attacks with Randomized Traffic Innovation: Botnet Identification Challenges and Strategies

机译:随机流量创新的DDos攻击:僵尸网络识别挑战和策略

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。
获取外文期刊封面目录资料

摘要

Distributed Denial-of-Service (DDoS) attacks are usually launched through the botnet, an 'army' of compromised nodes hidden in the network. Inferential tools for DDoS mitigation should accordingly enable an early and reliable discrimination of the normal users from the compromised ones. Unfortunately, the recent emergence of attacks performed at the application layer has multiplied the number of possibilities that a botnet can exploit to conceal its malicious activities. New challenges arise, which cannot be addressed by simply borrowing the tools that have been successfully applied so far to earlier DDoS paradigms. In this paper, we offer basically three contributions: 1) we introduce an abstract model for the aforementioned class of attacks, where the botnet emulates normal traffic by continually learning admissible patterns from the environment; 2) we devise an inference algorithm that is shown to provide a consistent (i.e., converging to the true solution as time elapses) estimate of the botnet possibly hidden in the network; and 3) we verify the validity of the proposed inferential strategy on a test-bed environment. Our tests show that, for several scenarios of implementation, the proposed botnet identification algorithm needs an observation time in the order of (or even less than) 1 min to identify correctly almost all bots, without affecting the normal users' activity.
机译:分布式拒绝服务(DDoS)攻击通常是通过僵尸网络发起的,该僵尸网络是隐藏在网络中的大量受感染节点。因此,用于缓解DDoS的推论工具应能使早期用户和正常用户与受感染用户区别开来。不幸的是,最近在应用程序层执行的攻击的出现使僵尸网络可以利用其隐藏其恶意活动的可能性成倍增加。出现了新的挑战,仅通过借用迄今为止已成功应用于早期DDoS范式的工具就无法解决。在本文中,我们基本上提供了三个方面的贡献:1)我们针对上述攻击类型引入了一种抽象模型,其中僵尸网络通过不断学习环境中可允许的模式来模拟正常流量; 2)我们设计了一种推理算法,该算法可提供可能隐藏在网络中的僵尸网络的一致性(即,随着时间的流逝收敛到真实的解); 3)我们在试验台环境中验证了所提出的推理策略的有效性。我们的测试表明,在几种实现方案中,提出的僵尸网络识别算法需要大约1分钟(甚至少于1分钟)的观察时间才能正确识别几乎所有的僵尸程序,而又不会影响正常用户的活动。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号