Suppr超能文献

DDoS 泛洪与目标服务变换传感器。

DDoS Flood and Destination Service Changing Sensor.

机构信息

Department of Computer Science and Information Engineering, National Central University, No.300, Zhongda Rd., Zhongli District, Taoyuan City 320, Taiwan.

出版信息

Sensors (Basel). 2021 Mar 11;21(6):1980. doi: 10.3390/s21061980.

Abstract

In this paper, we aim to detect distributed denial of service (DDoS) attacks, and receive a notification of destination service, changing immediately, without the additional efforts of other modules. We designed a kernel-based mechanism to build a new Transmission Control Protocol/Internet Protocol (TCP/IP) connection smartly by the host while the users or clients not knowing the location of the next host. Moreover, we built a lightweight flooding attack detection mechanism in the user mode of an operating system. Given that reinstalling a modified operating system on each client is not realistic, we managed to replace the entry of the system call table with a customized sys_connect. An effective defense depends on fine detection and defensive procedures. In according with our experiments, this novel mechanism can detect flooding DDoS successfully, including SYN flood and ICMP flood. Furthermore, through cooperating with a specific low cost network architecture, the mechanism can help to defend DDoS attacks effectively.

摘要

在本文中,我们旨在检测分布式拒绝服务 (DDoS) 攻击,并在不依赖其他模块额外努力的情况下,立即收到目标服务更改的通知。我们设计了一种基于内核的机制,该机制可以在主机在用户或客户端不知道下一个主机位置的情况下,巧妙地建立新的传输控制协议/互联网协议 (TCP/IP) 连接。此外,我们在操作系统的用户模式下构建了一种轻量级的泛洪攻击检测机制。由于在每个客户端上重新安装修改后的操作系统是不现实的,因此我们设法用定制的 sys_connect 替换系统调用表的条目。有效的防御取决于精细的检测和防御程序。根据我们的实验,这种新机制可以成功检测到包括 SYN 泛洪和 ICMP 泛洪在内的泛洪 DDoS 攻击。此外,通过与特定的低成本网络架构合作,该机制可以有效地帮助防御 DDoS 攻击。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ac65/7998187/b333e1913060/sensors-21-01980-g001.jpg

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验