期刊文献+

基于频谱混迭预畸变效应的DoS攻击准确检测

Accurate Detection of DoS Attacking Signal Based on Spectrum Aliasing Pre-distortion Effect
下载PDF
导出
摘要 传统的单谱脉冲响应信号畸变检测方法无法对DoS网络攻击信号实现有效检测,提出一种采用幅度和频率对应关系双线性变换的信号检测算法准确检测DoS网络攻击信号。利用格型陷波器线性预测特性,使DoS信号发出有效攻击前产生频谱混迭状态下的预畸变效应,及早发现攻击信号,达到有效准确检测的目的。仿真结果表明,采用该检测算法检测DoS网络攻击信号,检测性能很好,检测概率大幅提高,虚警概率为0,能有效应用到网络安全和信息对抗等领域。 The traditional single spectrum signal of the impulse response aberration detection method is unable to detect net-work attack of DoS signal, the signal detection algorithm using amplitude and frequency relation of bilinear transformation detection network attack of DoS signal is proposed. The linear prediction property is used and the spectrum aliasing pre-distortion effect of DoS attacking signal is occurred. The accurate detection is realized. Simulation result shows that using the detection algorithm to detect the DoS signal, the detection performance is good, and the detection probability is im-proved greatly, the probability of false alarm is 0, it can be effectively applied to network security and information confronta-tion field.
作者 陈婉 冯小欧
出处 《科技通报》 北大核心 2014年第8期38-40,共3页 Bulletin of Science and Technology
关键词 频谱混迭 DOS攻击 信号检测 格型陷波器 spectrum aliasing DoS attack signal detection lattice notch filter
  • 相关文献

参考文献5

二级参考文献52

  • 1SkoudisEd.反击黑客[M].北京:机械工业出版社,2002..
  • 2Kent S. Security architecture for the internet protocol[S].RFC 2401 Nov,1998.
  • 3Ioannidis J, Bellovin S.Implementing pushback: router-based defense against DDoS attacks[A].Proceedings of Network and Distributed System Security Symposium[C].Catamaran Resort Hotel San Diego, California,February,2002.
  • 4Ahsan H, Mohamed M, Hefeeda, Bharat B. Detecting service violations and DoS attacks[R]. CERIAS Tech Report TR 2002-15.
  • 5Ptacek, Thomas H, Timothy N N. Insertion, evasion, and denial of service: eluding network intrusion detection[C]. January, 1998. http://citeseer.ist.psu.edu/ptacek98insertion.html.
  • 6Matthew V, Mahoney, Philip K C. Learning nonstationary models of normal network traffic for detecting novel attacks[A]. Proceedings of KDD'02[C].Edmonton, Alberta, Canada, February 2002.376-385.
  • 7Stefan A. The base-rate fallacy and its implications for the difficulty of intrusion detection[A].Proceedings of the 6th ACM Conference on Computer and Communications Security[C].Singapore, 1999.1-7.
  • 8Leland W, Taqq M, Willinger W,et al. On the self-similar nature of ethernet traffic[A].Proceedings of ACM SIGCOMM'93[C]. San Francisco, California, August,1993.183-193.
  • 9Han Jiawei,Kamber M. Data mining:concepts and techniques[M].USA:Morgan Kaufmann Publishers,2001.81-93.
  • 10Ls Liebovitch, Toth T. A fast algorithm to determine fractal dimensions by box counting[J].Physics Letters, 1989,141A(8): 386-390.

共引文献95

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部