期刊文献+

基于用户浏览行为的HTTP Flood检测方法 被引量:1

The Http-flood Detection Methods Based on User Browsing Behavior
下载PDF
导出
摘要 与传统的基于低层协议的DDoS攻击相比,应用层DDoS具有更加显著的攻击效果,而且更加难以检测。现有的解决方法包括:特征检测、流量限制、隐半马尔可夫模型等。这些方法在检测应用层DDoS攻击(如,HTTP Get Flood)攻击时检测率不高或者检测速度较慢。提出的基于用户浏览行为的检测方法对HTTPFlood攻击检测效果明显得到改善。 With the traditional DDoS attacks based on low-level protocol than the application layer DDoS attacks have a more pronounced effect, but also more difficult to detect. Existing solutions include: feature detection, traffic restrictions, hidden semi-Markov model. These methods in the detection of application layer DDoS attacks (eg, http-get flood) attack detection rate is low or the detection of slow. Presented in this paper based on user browsing behavior of the detection method of the http flood attack detection results significantly improved.
作者 李萌
出处 《计算机安全》 2010年第2期61-63,共3页 Network & Computer Security
关键词 DDOS 基于用户行为 HTTP GET FLOOD DDoS based on user behavior http-get flood
  • 相关文献

参考文献2

二级参考文献46

  • 1孙知信,李清东.路由器端防范DDos攻击机制综述[J].南京邮电大学学报(自然科学版),2007,27(1):89-96. 被引量:8
  • 2李金明,王汝传.基于VTP方法的DDoS攻击实时检测技术研究[J].电子学报,2007,35(4):791-796. 被引量:18
  • 3Worldwide Infrastructure Security Report,Volume Ⅲ[OL].Arbor Networks,http://www.arbornetworks.com/report,September 2007.
  • 4Dittrich D.Distributed Denial of Service(DDoS) Attacks/tools[OL].http://staff.washington.edu/dittricb/misc/ddos/.
  • 5Kargl F,Maier J,Weber M.Protecting web servers from distributed denial of service attacks[A].In Proc.International Conference on World Wide Web[C].2001.
  • 6Hussain A,Heidemann J,Papadopoulos C.A framework for classifying denial of service attacks[A].In Proc.ACM SIGCOMM[C].2003.
  • 7Mirkovic J,Reiher P.A taxonomy of DDoS attack and DDoS defense mechanisms[J].ACM SIGCOMM Computer Communications Review.2004,34(2):39-53.
  • 8Carl G,Kesidis G,Brooks R R,et al.Denial-of-service attackdetection techniques[J].IEEE Internet Computing.2006,10(1):82-89.
  • 9Peng T,Leckie C,Ramamohanarao K.Survey of network-based defense mechanisms countering the DoS and DDoS problems[J].ACM Computing Surveys.2007,39(1).
  • 10Symantec Internet Security Threat Report[OL].http://www.Symantec.com/business/theme.jsp? themeid = threatreport,April 8 2008.

共引文献71

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部