浏览全部资源
扫码关注微信
中国石油大学(华东)计算机与通信工程学院,山东 青岛 266580
[ "石乐义(1975-),男,山东临朐人,博士,中国石油大学(华东)教授、硕士生导师,主要研究方向为网络安全、博弈理论和移动计算。" ]
[ "孙慧(1991-),女,山东滕州人,中国石油大学(华东)硕士生,主要研究方向为网络安全、主动网络防御。" ]
[ "崔玉文(1992-),男,山东济宁人,中国石油大学(华东)硕士生,主要研究方向为网络安全、隐蔽通信。" ]
[ "郭宏彬(1992-),男,山东潍坊人,中国石油大学(华东)硕士生,主要研究方向为网络安全、主动网络防御。" ]
[ "李剑蓝(1993-),男,江西婺源人,中国石油大学(华东)硕士生,主要研究方向为网络安全、深度学习。" ]
网络出版日期:2017-10,
纸质出版日期:2017-10-25
移动端阅览
石乐义, 孙慧, 崔玉文, 等. 抵御DoS攻击的端信息跳变Web插件机制[J]. 通信学报, 2017,38(Z1):19-24.
Le-yi SHI, Hui SUN, Yu-wen CUI, et al. Web plug-in paradigm for anti-DoS attack based on end hopping[J]. Journal on communications, 2017, 38(Z1): 19-24.
石乐义, 孙慧, 崔玉文, 等. 抵御DoS攻击的端信息跳变Web插件机制[J]. 通信学报, 2017,38(Z1):19-24. DOI: 10.11959/j.issn.1000-436x.2017230.
Le-yi SHI, Hui SUN, Yu-wen CUI, et al. Web plug-in paradigm for anti-DoS attack based on end hopping[J]. Journal on communications, 2017, 38(Z1): 19-24. DOI: 10.11959/j.issn.1000-436x.2017230.
端信息跳变技术是为了减缓网络攻击而提出的一种主动网络防御技术,它通过伪随机地改变通信中的地址、端口等端信息来达到迷惑攻击者的目的。通过浏览器插件机制,将端信息跳变技术引入到 Web 防护领域,从而在 Web 访问中迷惑和干扰攻击者。浏览器插件模型有 2 个工作模式,即非跳变模式和端信息跳变模式,插件模式根据UDP发言人的指令来进行切换,在通信链路安全可靠时插件不进行端信息跳变,能够降低服务代价;当网络受到攻击时切换至端信息跳变模式,保障通信链路的安全。实验结果证明,基于端信息跳变技术的 Web插件机制在SYN Flood攻击和UDP Flood攻击下,仍具有较高的服务性能和安全性能。
The end hopping technology is a proactive network defense technology proposed to mitigate the network attack.By changing the IP address
port and other information in the communication pseudo-randomly to achieve the purpose of confusing the attacker.The plug-in mechanism based on the end hopping technology was introduced
and it was applied to the field of Web protection.This plug-in was designed to confuse and interfere with attackers.The plug-in model was divided into two working modes
which are non-end-hopping mode and end hopping mode.The plug-in according to the instructions of the UDP spokesman to switch its own work mode and when the communication link is safe and reliable
it choose the fist mode which can reduce the cost of services.Another
when the network is attacked
the plug-in switches to the end hopping mode to ensure the safety of communications.The experimental results show that the plug-in mechanism based on end hopping has high service and security performance under SYN Flood attack and UDP Flood attack.
CARVALHO M , RICHARD F . Moving target defenses for computer networks [J ] . IEEE Security & Privacy , 2014 , 12 ( 2 ): 73 - 76 .
石乐义 , 贾春福 . 基于端信息跳变的主动网络防护研究 [J ] . 通信学报 , 2008 , 29 ( 2 ): 106 - 110 .
SHI L Y , JIA C F . Research on end hopping for active network confrontation [J ] . Journal on Communications , 2008 , 29 ( 2 ): 106 - 110 .
魏春霞 , 张琳琳 , 赵楷 . 基于源地址伪造的Web服务DoS攻击防御方法 [J ] . 计算机工程与设计 , 2014 , 35 ( 9 ): 3034 - 3038 .
WEI C X , ZHANG L L , ZHAO K . Method research based on source address forgery defending Web service DoS attacks [J ] . Computer Engineering and Design , 2014 , 35 ( 9 ): 3034 - 3038 .
刘泽宇 , 夏阳 , 张义龙 , 等 . 基于Web行为轨迹的应用层DDoS攻击防御模型 [J ] . 计算机应用 , 2017 , 37 ( 1 ): 128 - 133 .
LIU Z Y , XIA Y , ZHANG Y L , et al . Application-layer DDoS defense model based on Web behavior trajectory [J ] . Journal of Computer Applications , 2017 , 37 ( 1 ): 128 - 133 .
丁彭父乐 . 基于IPv6多地址性的DoS攻击与防御研究 [D ] . 哈尔滨:哈尔滨工业大学 , 2014 .
DING P F L . Based on IPv6 Multi-addresses DoS attack and defense research [D ] . Harbin:Harbin Institute of Technology , 2014 .
万明 , 张宏科 , 尚文利 , 等 . 一体化标识网络映射缓存DoS攻击防范方法研究 [J ] . 电子学报 , 2015 , 43 ( 10 ): 1941 - 1947 .
WAN M , ZHANG H K , SHANG W L , et al . An efficient approach to defend DoS attack against mapping cache under identifier-based universal network [J ] . Acta Electronica Sinica , 2015 , 43 ( 10 ): 1941 - 1947 .
李星 . 基于Snort的DDoS攻击检测系统研究与设计 [D ] . 北京邮电大学 , 2015 .
LI X . Research and design of DDoS attack detection system based on snort [D ] . Beijing University of Posts and Telecommunications , 2015 .
WANG H P , XU L , GU G F . Floodguard:a DoS attack prevention extension in software-defined networks [C ] // 45th Annual IEEE/IFIP International Conference on Dependable Systems and Network . 2015 .
MONIKA K , DEEPAK K G , PRADEEP B . DoS attack detection technique using back propagation neural network [C ] // International Conference on Advances in Computing,Communications and Informatics (ICACCI) . IEEE , 2016 .
PATEL J , KATKAR V . A multi-classifiers based novel DoS/DDoS attack detection using fuzzy logic [J ] . Springer , 2016 : 809 - 815 .
MOUSAVI S M . Early detection of DDoS attacks in software defined networks controller [D ] . Ottawa:Carleton University , 2014 .
杨梦婷 . 基于OpenFlow的SDN网络仿真平台设计与DoS攻击检测 [D ] . 北京:北京邮电大学 , 2015 .
YANG M T . OpenFlow-based SDN network simulation platform and DoS attack detection [D ] . Beijing:Beijing University of Posts and Telecommunications , 2015 .
LIM S , HA J , KIM H , et al . A SDN-oriented DDoS blocking scheme for botnet-based attacks [C ] // Sixth International Conference on Ubiquitous and Future Networks . IEEE , 2014 : 63 - 68 .
贾春福 , 林楷 , 鲁凯 . 基于端信息跳变DoS攻击防护机制中的插件策略 [J ] . 通信学报 , 2009 , 30 ( 10 ): 114 - 118 .
JIA C F , LIN K , LU K . Plug-in policy for DoS attack defense mechanism based on end hopping [J ] . Journal on Communications , 2009 , 30 ( 10 ): 114 - 118 .
林楷 , 贾春福 . 基于消息篡改的端信息跳变技术 [J ] . 通信学报 , 2013 , 34 ( 12 ): 142 - 148 .
LIN K , JIA C F . End hopping based on message tampering [J ] . Journal on Communications , 2013 , 34 ( 12 ): 142 - 148 .
刘江 , 张红旗 , 代向东 , 等 . 基于端信息自适应跳变的主动网络防御模型 [J ] . 电子与信息学报 , 2015 , 37 ( 11 ): 2642 - 2649 .
LIU J , ZHANG H Q , DAI X D , et al . A proactive network defense model based on selfadaptive end hopping [J ] . Journal of Electronics and Information Technology , 2015 , 37 ( 11 ): 2642 - 2649
0
浏览量
793
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构