Description: IP反向追踪技术综述
拒绝服务攻击(DoS)给政府部门和商业机构造成了严重的经济损失和社会威胁。IP追踪技术能够反向追踪IP数据包到它
们的源头,所以是识别和阻止DoS攻击的重要一步。本文针对DoS攻击,对比分析了各个IP反向追踪方法的基本原理和优缺点。
关键词 DoS攻击 主动追踪 反应追踪-IP traceback Technology denial of service attacks (DoS) to government departments and commercial organizations have caused serious The economic losses and social threats. IP tracking technology to backtracking IP data packets to their source, So it is to identify and stop DoS attacks important step forward. This paper DoS attacks, comparison and analysis of the various IP traceback method of the basic tenets of advantages and disadvantages. Keywords DoS attack response tracking initiative tracking Platform: |
Size: 38825 |
Author:air |
Hits:
Description: IP反向追踪技术综述
拒绝服务攻击(DoS)给政府部门和商业机构造成了严重的经济损失和社会威胁。IP追踪技术能够反向追踪IP数据包到它
们的源头,所以是识别和阻止DoS攻击的重要一步。本文针对DoS攻击,对比分析了各个IP反向追踪方法的基本原理和优缺点。
关键词 DoS攻击 主动追踪 反应追踪-IP traceback Technology denial of service attacks (DoS) to government departments and commercial organizations have caused serious The economic losses and social threats. IP tracking technology to backtracking IP data packets to their source, So it is to identify and stop DoS attacks important step forward. This paper DoS attacks, comparison and analysis of the various IP traceback method of the basic tenets of advantages and disadvantages. Keywords DoS attack response tracking initiative tracking Platform: |
Size: 38912 |
Author:air |
Hits:
Description: Since the first denial of Service (DoS) attack appears, DoS attacks cause significant financial damage
every year. The majority researchers focus on detection and respond mechanism of DoS, whereas limited progress has
been made in the details of DoS attacks. In this paper, we introduce Custom Audit Scripting Language (CASL) applied
to write simulation program for DoS attacks. Then we take a deep research in the methodology of DoS attacks and
simulate two typical DoS attacks in CASL. Additionally, recent trends of DoS attacks and problems associated with
defending against DoS attacks are also discussed. In short, our simulation attack programs can help examine the nature
of DoS attacks and find the corresponding countermeasures Platform: |
Size: 152576 |
Author:saksss |
Hits:
Description: Abstract—Denial of Service attacks are presenting an increasing threat to the global inter-networking infrastructure. While TCP’s congestion control algorithm is highly robust to diverse network conditions, its implicit
assumption of end-system cooperation results in a well-known vulnerability to attack by high-rate non-responsive fl ows. In this paper, we investigate a class of low-rate denial of service attacks which, unlike high-rate attacks, are diffi cult for routers and counter-DoS mechanisms to detect. Using a combination of analytical modeling, simulations, and Internet experiments, we show that maliciously chosen low-rate DoS traffi c patterns that exploit TCP’s retransmission timeout mechanism can throttle TCP fl ows to a small
fraction of their ideal rate while eluding detection. Moreover, as such attacks exploit protocol homogeneity, we study fundamental limits of the ability of a class of randomized timeout mechanisms to thwart such low-rate
DoS attacks.-Abstract—Denial of Service attacks are presenting an increasing threat to the global inter-networking infrastructure. While TCP’s congestion control algorithm is highly robust to diverse network conditions, its implicit
assumption of end-system cooperation results in a well-known vulnerability to attack by high-rate non-responsive fl ows. In this paper, we investigate a class of low-rate denial of service attacks which, unlike high-rate attacks, are diffi cult for routers and counter-DoS mechanisms to detect. Using a combination of analytical modeling, simulations, and Internet experiments, we show that maliciously chosen low-rate DoS traffi c patterns that exploit TCP’s retransmission timeout mechanism can throttle TCP fl ows to a small
fraction of their ideal rate while eluding detection. Moreover, as such attacks exploit protocol homogeneity, we study fundamental limits of the ability of a class of randomized timeout mechanisms to thwart such low-rate
DoS attacks. Platform: |
Size: 236544 |
Author:van hoi |
Hits:
Description: This paper describes the clustering problem first, and
then utilizes the genetic algorithm to implement the optimization
of clustering methods. Based on the optimized
clustering on the sample data, we get various categories of
the relation between traffics and attack amounts, and then
builds up several prediction sub-models about DoS attack.
Furthermore, according to the Bayesian method, we deduce
discrete probability calculation about each sub-model
and then get the distribution discrete probability prediction
model for DoS attack. Platform: |
Size: 169984 |
Author:ahmed |
Hits:
Description: This paper presents a simple but fast and effective method
to detect TCP SYN flooding attacks. Linear prediction analysis is
proposed as a new paradigm for DoS attack detection. The proposed
SYN flooding detection mechanism makes use of the exponential backoff
property of TCP used during timeouts. By modeling the difference
of SYN and SYN+ACK packets, we are successfully able to detect an
attack within short delays. We use this method at leaf routers and
firewalls to detect the attack without the need of maintaining any state. Platform: |
Size: 3526656 |
Author:ahmed |
Hits:
Description: 本文对linux的IP组装算法进行了分析,因为IP碎片经常用于DOS等攻击,在文章后面我结合了一些攻击方法进行了更进一步的说明
-In this paper, the IP linux assembly algorithm analysis, because the IP fragments are often used in attacks such as DOS, later in the article I combine several attack methods are further described Platform: |
Size: 12288 |
Author:tang |
Hits: