• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

DDoS 泛洪与目标服务变换传感器。

DDoS Flood and Destination Service Changing Sensor.

机构信息

Department of Computer Science and Information Engineering, National Central University, No.300, Zhongda Rd., Zhongli District, Taoyuan City 320, Taiwan.

出版信息

Sensors (Basel). 2021 Mar 11;21(6):1980. doi: 10.3390/s21061980.

DOI:10.3390/s21061980
PMID:33799796
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7998187/
Abstract

In this paper, we aim to detect distributed denial of service (DDoS) attacks, and receive a notification of destination service, changing immediately, without the additional efforts of other modules. We designed a kernel-based mechanism to build a new Transmission Control Protocol/Internet Protocol (TCP/IP) connection smartly by the host while the users or clients not knowing the location of the next host. Moreover, we built a lightweight flooding attack detection mechanism in the user mode of an operating system. Given that reinstalling a modified operating system on each client is not realistic, we managed to replace the entry of the system call table with a customized sys_connect. An effective defense depends on fine detection and defensive procedures. In according with our experiments, this novel mechanism can detect flooding DDoS successfully, including SYN flood and ICMP flood. Furthermore, through cooperating with a specific low cost network architecture, the mechanism can help to defend DDoS attacks effectively.

摘要

在本文中,我们旨在检测分布式拒绝服务 (DDoS) 攻击,并在不依赖其他模块额外努力的情况下,立即收到目标服务更改的通知。我们设计了一种基于内核的机制,该机制可以在主机在用户或客户端不知道下一个主机位置的情况下,巧妙地建立新的传输控制协议/互联网协议 (TCP/IP) 连接。此外,我们在操作系统的用户模式下构建了一种轻量级的泛洪攻击检测机制。由于在每个客户端上重新安装修改后的操作系统是不现实的,因此我们设法用定制的 sys_connect 替换系统调用表的条目。有效的防御取决于精细的检测和防御程序。根据我们的实验,这种新机制可以成功检测到包括 SYN 泛洪和 ICMP 泛洪在内的泛洪 DDoS 攻击。此外,通过与特定的低成本网络架构合作,该机制可以有效地帮助防御 DDoS 攻击。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/70b831bd691c/sensors-21-01980-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/b333e1913060/sensors-21-01980-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/35b5aa35d0b4/sensors-21-01980-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/f84e94b5f709/sensors-21-01980-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/4c7a3e421aa4/sensors-21-01980-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/26d6712b6948/sensors-21-01980-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/da173c09b7d7/sensors-21-01980-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/31c1c17e023a/sensors-21-01980-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/5f0c3a8f910b/sensors-21-01980-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/841956926445/sensors-21-01980-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/edf71663eb97/sensors-21-01980-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/53dea8db9b0e/sensors-21-01980-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/01d753e330be/sensors-21-01980-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/70b831bd691c/sensors-21-01980-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/b333e1913060/sensors-21-01980-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/35b5aa35d0b4/sensors-21-01980-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/f84e94b5f709/sensors-21-01980-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/4c7a3e421aa4/sensors-21-01980-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/26d6712b6948/sensors-21-01980-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/da173c09b7d7/sensors-21-01980-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/31c1c17e023a/sensors-21-01980-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/5f0c3a8f910b/sensors-21-01980-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/841956926445/sensors-21-01980-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/edf71663eb97/sensors-21-01980-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/53dea8db9b0e/sensors-21-01980-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/01d753e330be/sensors-21-01980-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/70b831bd691c/sensors-21-01980-g013.jpg

相似文献

1
DDoS Flood and Destination Service Changing Sensor.DDoS 泛洪与目标服务变换传感器。
Sensors (Basel). 2021 Mar 11;21(6):1980. doi: 10.3390/s21061980.
2
RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks.RAPT:一种减轻SYN泛洪分布式拒绝服务网络攻击的稳健攻击路径追踪算法。
Sensors (Basel). 2022 Dec 22;23(1):102. doi: 10.3390/s23010102.
3
Boğaziçi University distributed denial of service dataset.博阿齐奇大学分布式拒绝服务数据集。
Data Brief. 2020 Aug 17;32:106187. doi: 10.1016/j.dib.2020.106187. eCollection 2020 Oct.
4
HLD-DDoSDN: High and low-rates dataset-based DDoS attacks against SDN.HLD-DDoSDN:基于高低速率数据集的针对 SDN 的 DDoS 攻击。
PLoS One. 2024 Feb 8;19(2):e0297548. doi: 10.1371/journal.pone.0297548. eCollection 2024.
5
SDN-Defend: A Lightweight Online Attack Detection and Mitigation System for DDoS Attacks in SDN.SDN-Defend:一种用于软件定义网络中分布式拒绝服务攻击的轻量级在线攻击检测与缓解系统
Sensors (Basel). 2022 Oct 28;22(21):8287. doi: 10.3390/s22218287.
6
Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT.基于自适应机器学习的支持软件定义网络的物联网分布式拒绝服务攻击检测与缓解系统
Sensors (Basel). 2022 Mar 31;22(7):2697. doi: 10.3390/s22072697.
7
Countering DDoS Attacks in SIP Based VoIP Networks Using Recurrent Neural Networks.使用递归神经网络对抗基于 SIP 的 VoIP 网络中的 DDoS 攻击。
Sensors (Basel). 2020 Oct 17;20(20):5875. doi: 10.3390/s20205875.
8
An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment.分布式环境中的一种自适应分布式拒绝服务攻击预防技术
Sensors (Basel). 2023 Jul 21;23(14):6574. doi: 10.3390/s23146574.
9
Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers.挖掘IP到域名的交互以检测针对递归DNS服务器的DNS洪水攻击。
Sensors (Basel). 2016 Aug 17;16(8):1311. doi: 10.3390/s16081311.
10
Real-time DDoS flood attack monitoring and detection (RT-AMD) model for cloud computing.用于云计算的实时分布式拒绝服务泛洪攻击监测与检测(RT-AMD)模型
PeerJ Comput Sci. 2022 Jun 13;7:e814. doi: 10.7717/peerj-cs.814. eCollection 2022.

引用本文的文献

1
An Adaptive Protection System for Sensor Networks Based on Analysis of Neighboring Nodes.基于邻近节点分析的传感器网络自适应保护系统。
Sensors (Basel). 2021 Sep 12;21(18):6116. doi: 10.3390/s21186116.