期刊文献+

基于DNS的拒绝服务攻击研究与防范 被引量:11

Research on exploiting DNS for DoS attack and defence
在线阅读 下载PDF
导出
摘要 基于域名系统(DNS)的拒绝服务攻击利用DNS协议的缺陷,对计算机网络的基础设施或可用资源进行攻击,能迅速使被攻击目标资源耗尽,给网络信息安全带来了严重威胁。在分析DNS特点和缺陷的基础上,阐述利用DNS进行拒绝服务攻击的原理,重点研究欺骗式和反弹式两种攻击方式,构建实验环境深入分析攻击技术,最后提出了4种有效的防范措施。 Denial of service (DOS) technique based on DNS utilizes the flaws of DNS protocol to launch an attack to the network infrastructure and available resources. It is able to exhaust target's resource within a short time and thus brings serious threat to the network security. The flaws of DNS protocol and makes an illustration on the mechanism of DNS-based DoS attack is exploited. Two attacking methods, spoofing and reflection, are studied in detail. Experimental environment is build for data-based analysis. Finally four protection measures are presented.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第1期21-24,共4页 Computer Engineering and Design
关键词 域名系统 拒绝服务攻击 反弹式攻击 网络安全 防范 DNS denial of service attack reflection attack network security defence
作者简介 张小妹(1981-),女,福建建瓯人,硕士,研究方向为网络安全; E-mail:funkaizxm@163.com 赵荣彩(1957-),男,河南洛阳人,教授,博士生导师,研究方向为网络安全、并行计算、先进编译技术; 单征(1977-),男,辽宁沈阳人,博士研究生,研究方向为网络安全; 陈静(1978~),女,山东泰安人,助教,研究方向为计算机网络安全。
  • 相关文献

参考文献7

  • 1[2]Randal Vaughn,Gadi Evron.DNS amplification attacks[EB/OL].http://www.isotf.org/news/DNS-Amplification-Attacks.pdf,2006-03-17.
  • 2[3]ICANN.Root Server Attack on 6 February 2007[EB/OL].http:// www.icann.org/announcements/faetsheet-dns-attack-08mar07.pdf,2007-03.
  • 3[4]Eastlake D.Domain name system security extensions[S].RFC2535,IETF,1999-03.
  • 4[5]The Measurement Factory.Domain name servers:Pervasive and critical,yet often overlooked[EB/OL],http://dns.measurement-factory.com/surveys/suml.html,2006-06-14.
  • 5贺龙涛,方滨兴,胡铭曾.主动监听中协议欺骗的研究[J].通信学报,2003,24(11):146-152. 被引量:22
  • 6[7]Athins D.Threat analysis of the domain name system[EB/OL].http://www.ietf.org/interne t-drafts/draft-ietf-dnsext-dns-threats-01,2002.
  • 7[8]Verisign.Anatomy of recent DNS reflector attacks from the vic-tim and reflector point of view[EB/OL].http://www.verisign.com/static/037903.pdf,2006-06-14.

二级参考文献12

  • 1[1]CLAERHOUT B. A short overview of IP spoofing [J]. Phrack Magazine, 1996, 48(7):14.
  • 2[2]CROSBIE M, SPAFFORD G. Defending A Computer System using Autonomous Agents[R]. COAST Laboratory, 1994.
  • 3[3]JOYE M, QUISQUATER J J. On the importance of securing your bins: the garbage-man-in-the-middle attack[A]. 4th ACM Conf Computer Comm Security[C]. 1997.135-141.
  • 4[4]WRIGHT G R, STEVENS W R. TCP/IP Illustrated Volume 1: the Protocol[M]. Addison Wesley Publishing Company, 1994.
  • 5[5]PLUMMER D C. An Ethernet Address Resolution Protocol, RFC 826[S]. 1982.
  • 6[6]POSTERL J. Internet Control Message Protocol, RFC 792[S]. 1981.
  • 7[7]HEDRICK C. Routing Information Protocol, RFC 1058[S]. 1988.
  • 8[8]MALKIN G. RIP Version 2 Carrying Additional Information, RFC 1723[S]. 1994.
  • 9[9]MOCKAPETRIS P. Domain names - Concepts and Facilities, RFC 1034[S]. 1987.
  • 10[10]MOCKAPETRIS P. Domain Names - Implementation and Specification, RFC 1035[S]. 1987.

共引文献21

同被引文献42

  • 1闫伯儒,方滨兴,李斌,王垚.DNS欺骗攻击的检测和防范[J].计算机工程,2006,32(21):130-132. 被引量:23
  • 2张健沛,程丽丽,马骏.一种基于并行支持向量机的网络入侵检测方法[J].计算机工程与应用,2007,43(4):137-139. 被引量:2
  • 3李静梅,吴鹏.智能DNS系统的设计与实现[J].计算机工程与应用,2007,43(11):157-160. 被引量:17
  • 4宗兆伟,黎峰,翟征德.基于统计分析和流量控制的DNS分布式拒绝服务攻击的检测及防御[C].北京:2009全国计算机网络与通信学术会议.2009.
  • 5Secure Works, Inc. DNS Cache Poisoning-The Next eneration [EB/OL]. (2007-04-03). [2009-09-01].http://www. secureworks. com/research/articles/cachepoisoning.
  • 6MOCKAPETRIS P. Domain Names-concepts and Facilities[S]. USA:The Internet Society, 1987: 5-17.
  • 7MOCKAPETRIS P. Domain Names-implementation and Specification[S]. USA:The Internet Society, 1987:31-43.
  • 8SZMIT A, TOMASZEWSKI M, SZMIT M. Domain Name Servers Pseudo- Random Number Generators and DNS Cache Poisoning Attack[J]. Polish Journal of Environmental Studies, 2006,15(4c):1-6.
  • 9ARENDS R, AUSTEIN R, LARSON M. DNS Security Introduction and Requirements[S]. USA:The Internet Society, 2005: 7-15.
  • 10ARENDS R, AUSTEIN R, LARSON M. Resource Records for the DNS Security Extensions[S].USA:The Internet Society, 2005:4-14.

引证文献11

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部