期刊文献+

面向用户的DoS攻击效果评估方法研究 被引量:2

Research on user-centric DoS attack impact assessment
下载PDF
导出
摘要 DoS攻击效果评估是安全测评中的重要研究内容,从用户关注的服务出发,依据3GPP QoS标准服务质量指标体系,建立了DoS攻击效果三维评估模型并确定了攻击效果综合评估算法。实验结果表明,该三维攻击效果评估方法简单实用,是面向最终用户的安全测评方法。 Attack impact assessment is an important research in security testing and evaluation. Focusing on the end users' quality of service, a DoS attack impact assessment model based on QoS indexes is proposed. A user-centric three-dimensional attack impact model is established and arithmetic to measure the DoS attack impact on different services' QoS is proposed. Experiments successfully demo- nstrate that the method simple and capture the DoS impact precisely in accordance with end user' s perspective.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第15期3834-3837,共4页 Computer Engineering and Design
基金 国防预研基金项目
关键词 拒绝服务 攻击效果评估 安全测评 服务质量 面向用户 DoS attack impactassessment security testing QoS user-centric
  • 相关文献

参考文献13

  • 1Zero day protection: The most powerful asset in your network defense system watchguard [DB/OL]. http://www.watchguard. com/products/appliances.asp,2007.
  • 2抗DoS、DDoS防火墙产品大检阅[EB/OL].http://www.1rmb.com/ddosdndex.asp,2007.
  • 3Top layer intrusion prevention system products[EB/OL]. Top- Layer. http://www.toplayer.com/content/index.j sp,2007.
  • 4Juniper.Denial of service and attack protection[R].Uinted States: Juniper Networks Inc, 2005.
  • 5DefensePro:Intrusion Prevention & DoS Protection up to 6Gbps [DB/OL]. http://www.radware.com/content/products/de fault.asp, 2007.
  • 6Johnson H, Qaisrani B, Fiedler M, et al. Hierarchical defense structure for mitigating DoS attacks[C].IEEE International Conference,2006:83.
  • 7Jarmo V E Molsa. Effectiveness of rate-limiting in mitigating flooding DOS attack. Networking Laboratory[C].International Association of Science and Technology for Development,2004: 155-160.
  • 8Pete Perlegos. DoS defense in structured peer-to-peer networks [R]. University of California, Berkeley, Report No. UCB/CSD- 04-1309, 2004.
  • 9Nortel Networks. QoS performance requirements for UMTS [DB/OL].The 3rd Generation Partership Project(3GPP). http:// www.3gpp.org, 1999.
  • 10陈伟,何炎祥,彭文灵.一种轻量级的拒绝服务攻击检测方法[J].计算机学报,2006,29(8):1392-1400. 被引量:26

二级参考文献34

  • 1SkoudisEd.反击黑客[M].北京:机械工业出版社,2002..
  • 2Thomer M. Gil, Massimiliano Poletto. Multops: A data-structure for bandwidth attack detection. The 10th USENIX Security of Symposium, Washington, 2001.
  • 3Laura Feinstein, Dan Schnackenberg, Tavindra Balupari, et al.Statistical approaches to DDoS attack detection and response.DARPA Information Survivability Conf. and Exposition (DISCEX'03), Washington, 2003.
  • 4Lawrence R. Rabiner. A tutorial on hidden Markov models and selected applications in speech recognition. Proc. IEEE, 1989, 77(2): 257~286.
  • 5L.R. Rabiner, B. H. Juang. An introduction to hidden Markov models. IEEE ASSP Magazine, 1986, 3(1): 4~16.
  • 6D. Moore, G. Voelker, S. Savage. Inferring internet denial-ofservice activity. The 10th USENIX Security Symposium,Washington, 2001.
  • 7MAWI Working Group. Traffic archive. http:∥tracer. csl. sony.co. jp/mawi/, 2003.
  • 8M. Roesch. Snort-Lightweight Intrusion Detection for Networks.The 13th Systems Administration Conf. ( LISA ' 99 ),Washington, 1999.
  • 9CERT/CC Coordination Center.Trends in Denial of Service Attack Technology.October 2001
  • 10Honig A.,Howard A.,Eskin E.,Stolfo S..Adaptive model generation:An architecture for the deployment of data miningbased intrusion detection systems.Data Mining for Security Applications,Kluwer,2002

共引文献78

同被引文献5

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部