• Article
  • | |
  • Metrics
  • |
  • Reference [12]
  • |
  • Related [20]
  • |
  • Cited by [10]
  • | |
  • Comments
    Abstract:

    Under the situation of detecting attacks, current IDSs have no good reacting strategy to filter attack traffic. Based on network attacks’ traffic characters, an anomaly traffic character aggregation algorithm (AFCAA) is put forward. Because normal DOS (denial of service)/DDOS (distributed denial of service) attack traffic has some characters in their packets’ head, AFCAA uses the center of gravity theory to process statistic aggregation and aggregation partition based on the special field of the destination IP attack traffic in a fixed Euclid distance, and then it distills the center of attack traffic dynamically as the characters of attacks. Afterwards, through transmitting these characters to Net Filter, AFCAA can filter abnormal packets efficiently and protect the normal packet transmission. The experimental results show that the software router using AFCAA can efficiently find useful characters of prevalent DOS/DDOS attacks, reduce the harm of attack packets’ spreading, and protect the limited network resources.

    Reference
    [1]Siris VA,Papagalou F.Application of anomaly detection algorithms for detecting SYN flooding attacks.In:Regency H,ed.Global Telecommunications Conf.(GLOBECOM 2004).Dallas:IEEE,2004.2050-2054.
    [2]Jin SY,Yeung DS.A eovariance analysis model for DDoS attack detection.In:Baal-Schem J,Bregni S,eds.Communications,2004 IEEE Int'l Conf.Paris:IEEE Communications Society,2004.1882-1886.
    [3]Li W,Wu LF,Hu GY.Design and implementation of distributed intrusion detection system NetNumen.Journal of Software,2002,13(8):1723-1728 (in Chinese with English abstract).http://www.jos.org.cn/1000-9825/13/1723.pdf
    [4]Liang F,Yau D.Using adaptive router throttles against distributed denial-of-service attacks.Journal of Software,2002,13(7):1120-1127 (in Chinese with English abstract).http://www.jos.org.cn/1000-9825/13/1120.pdf
    [5]Thomas R,Mark B,Johnson T,Croall J.NetBouncer:Client-Legitimacy-Based high-performance DDoS filtering.In:Wermer B,ed.DARPA Information Survivability Conf.and Exposition 2003.Washington:Institute of Electrical and Electronics Engineers,Inc.,2003.14-25.
    [6]Kim YH,Jo JY,Chao HJ,Merat F.High-Speed router filter for blocking TCP flooding under DDoS attack Performance.In:George AD,Johnson E,Richard GG,Xue GL,eds.Computing and Communications Conf.2003.Phoenix:IEEE Computer Society,2003.183-190.
    [7]Sung M,Xu J.IP traceback-based intelligent packet filtering:A novel technique for defending against Internet DDoS attacks.IEEE Trans.on Parallel and Distributed Systems,2003,14(9):861-872.
    [8]Feinstein L,Schnackenberg D,Balupari R,Kindred D.DDoS tolerant networks.In:Wermer B,ed.DARPA Information Survivability Conf.and Exposition,2003.Washington:Institute of Electrical and Electronics Engineers,Inc.,2003.73-75.
    [9]2000 DARPA intrusion detection scenario specific data sets.2000.http://www.ll.mit.edu/ll.mit.edu/SST/ideval/data/2000/2000 data index.html
    [10]Chan EYK,Chan HW,Chan KM,Chan VPS,Chanson ST,Cheung MMH,Chong CF,Chow KP,Hui AKT,Hui LCK,Lam LCK,Lau WC,Pun KKH,Tsang AYF,Tsang WW,Tso SCW,Yeung DY,Yu KY.IDR:An intrusion detection router for defending against distributed denial-of-service (DDOS) attacks.In:Hsu FD,Ibarra OH,Saldana RP,eds.Proc.of the 7th Int'l Symp.on Parallel Architectures,Algorithms and Networks.Los Alamitos:Ateneo de Manila University,2004.581-586.
    [3]李旺,吴礼发,胡谷雨.分布式网络入侵检测系统NetNumen的设计与实现.软件学报,2002,13(8):1723-1728.http://wwwjos.org.cn/1000-9825/13/1723.pdf
    [4]梁丰,YAU D.利用路由器自适应限流防御分布拒绝服务攻击.软件学报,2002,13(7):1120-1127.http://wwwjos.org.cn/1000-9825/13/1120.pdf
    Comments
    Comments
    分享到微博
    Submit
Get Citation

孙知信,唐益慰,张伟,宫婧,王汝传.基于特征聚类的路由器异常流量过滤算法.软件学报,2006,17(2):295-304

Copy
Share
Article Metrics
  • Abstract:4827
  • PDF: 6009
  • HTML: 0
  • Cited by: 0
History
  • Received:May 11,2005
  • Revised:August 15,2005
You are the first2044985Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063