期刊文献+

MANET中基于邻居联盟的DDoS攻击检测和过滤

NEIGHBOR UNION-BASED DDoS ATTACK DETECTION AND FILTERING IN MANET
在线阅读 下载PDF
导出
摘要 随着移动自组织网络在各个领域里得到广泛的使用,其安全性显得越来越重要。DDoS攻击在有线网络中产生了极大的破坏,同样,它已经威胁到移动自组织网络的安全。提出一种新的防御体系来抵御移动自组织网络中DDoS攻击。该防御模式基于邻居联盟,并在此基础上对攻击数据包进行检测与过滤。通过实验证明该检测与过滤策略能够有效地防御DDoS攻击。此外,该策略耗费较小的存储空间以及具有较高的时间效率。 When the mobile Ad Hoe Network (MANET) is widely used in many areas, the research on the security of the MANET is becoming more and more important. Because of its peculiarity, DDoS attacks have brought very serious threats to the MANET as well as to the wired network. A new efficient Neighbor Union-based defensive architecture is proposed to defend DDoS attacks in MANET. Attack data packets are detected and filtered. Experiments show that this detection and filtering policy can defend DDoS attacks effectively,while little storage space and time is consumed.
出处 《计算机应用与软件》 CSCD 北大核心 2008年第9期263-265,278,共4页 Computer Applications and Software
关键词 分布式拒绝服务 移动自组织网络 邻居联盟 检测和过滤 Distributed denial-of-service Mobile ad hoc network Neighbor union Detection and filtering
作者简介 赵渡,硕士生,主研领域:网络安全。
  • 相关文献

参考文献5

  • 1Jelena Mirkovic, Janic Martin, Peter Reiher. A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms. ACM SIGCOMM Computer Communication Review ,2004.
  • 2徐恪,徐明伟,吴建平.分布式拒绝服务攻击研究综述[J].小型微型计算机系统,2004,25(3):337-346. 被引量:33
  • 3Geng Xianjun, Huang Yun, Andrew B Whinston. Defending Wireless Infrastructure Against the Challenge of DDoS Attacks. Mobile Network and Applications ,2002.
  • 4Kihong Park, Heejo Lee. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power21aw internets [ C]. In: Proceedings of ACM SIGCOMM,2001.
  • 5Wan K K, Chang R. Engineering of a global defense infrastructure for DDoS attacks[ C ]. In Proceedings of IEEE International Conference on Networks, 2002,8.

二级参考文献36

  • 1[1]Kent S, Atkinson R. Security architecture for the internet protocol[S]. RFC2401, Nov. 1998.
  • 2[2]Harkins D, Carrel D. The internet key exchange(IKE)[S]. RFC2409, Nov. 1998.
  • 3[3]Moore D, Voelker G and Savage S. Inferring internet denial-of-service activity[C]. In Proceeding of 10th USENIX Security Symposium, 2001.
  • 4[4]Computer emergency response team[EB/OL]. Results of Distributed Systems Intruder Tools Workshop. http://www.cert.org/reports/dist-workshop-final.html, Nov. 1999.
  • 5[5][EB/OL].http://arbornetworks.com/
  • 6[6][EB/OL].http://www.astanetworks.com/products/vantage/
  • 7[7][EB/OL].http://www.entercept.com/products/
  • 8[8][EB/OL].http://www.mazunetworks.com/solutions/product-overview.html
  • 9[9]Rocky K C Chang. Defending against flooding-based distributed denial-of-service attacks: a tutorial[J]. IEEE Communications Magazine, October 2002.
  • 10[10]Jon Postel. Transmission control protocol[S]. RFC793, September 1981.

共引文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部