Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering and Design》 2010-01
Add to Favorite Get Latest Update

DDoS attack detecting algorithm based on relation of characteristic parameters

FENG Jiang,LIU Yuan(School of Information and Engineering,Southern Yangtze University,Wuxi 214122,China)  
As traditional methods can not effectively detect DDoS attacks in time,DDoS attacking traffic is distinguished from normal flash crowd traffic on theory by analyzing the basic features of a DDoS and a DDoS attack detecting algorithm based on that is proposed according to the analysis of the essential characteristic of DDoS.The scheme detect a DDoS attack traffic in its early stages when the attacking packet’s attribute value has no distinct features.It can differentiate DDoS from normal burst traffic.The simulation shows the algorithm’s validity and accuracy.
【Fund】: 国防预研基金项目(A1420061266)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 1 Hits
1 XIA Chun-tao,DU Xue-hui,HAO Yao-hui,WANG Ting(Institute of Electronic Technology,PLA Information Engineering University,Zhengzhou 450004,China);Implementation of SYN Flood attack testing based on. NET framework[J];Computer Engineering and Design;2011-06
Chinese Journal Full-text Database 3 Hits
1 LI Geng-sheng Long-distance Education College of Ningxia University,Yinchuan 750021,China;Detecting DDoS attacks against Web server using time series analysis[J];Computer Engineering and Applications;2007-07
2 WU Qing-tao, SHAO Zhi-qing~ Department of Computer Science and Engineering, East China University of Science and Technology, Shanghai 200237, China;Detecting DDoS Attacks against Web Server Using Time Series Analysis[J];武汉大学学报(自然科学版.英文版);2006-01
3 WU Qingtao~ 1 , SHAO Zhiqing~ 2 , DING Zhiyi~ 2 , LIU Gang~ 2 1.Department of Computer Science, Henan University of Science and Technology, Luoyang 471003, Henan, China; 2.Department of Computer Science and Engineering, East China University of Science and Technology, Shanghai 200237, China;A Robust IP Packets Filtering Mechanism for Protecting Web Server from DDoS Attacks[J];武汉大学学报(自然科学版.英文版);2006-05
Chinese Journal Full-text Database 6 Hits
1 YAN Fen1,2 WANG Jia-jia2 CHEN Yi-qun2 YIN Xin-chun2 HUANG Hao1(State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing 210093,China)1(Department of Computer Science and Engineering,Technology Institute,Yangzhou University,Yangzhou,225009,China)2;Light-weight Detection Method against SYN Flooding Attacks[J];Computer Science;2008-09
2 ZHU Ping,JIA Zhuosheng(School of Computer and Information Technology,Beijing Jiaotong University,Beijing 100044);Sniffer and Interruption of TCP/IP Communication[J];Computer Engineering;2006-21
3 XU Xiao-dong~(1,2) YANG Hai-liang~2 ZHU Shi-rui~2 (1.School of Computer Science and Technology,Nanjing University of Science & Technology,Nanjing 210094; 2.Network Center,Jiangsu University,Zhenjiang 212013);SYN Flood Detection Method Based on Heavy-tail Property[J];Computer Engineering;2008-22
4 PAN Yan-hua,ZHA Chun-xia,ZHANG Bing-fan1,TIAN Zong-zhou(School of Economics and Management,School of Electronic Information1,Jiangsu University of Science and Technology,Zhenjiang Jiangsu 212003,P.R.China);Research and Implementation of SYN Flood Attack Defense System[J];Science Technology and Engineering;2010-01
5 CHEN Ping-ping, ZHANG Yong-chao, LI Chang-sen(Department of Computer Science, College of Information Science and Technology, SUN Yat-sen University,Guangzhou 510275, China);Analysis of SYN flooding attack[J];Computer Engineering and Design;2005-01
6 HUANG Yi-wang,WAN Liang,LI Xiang(Institute of Computer Software and Theory,Guizhou University,Guiyang 550025,China);SYNFlood Attack Based on IP Spoofing[J];Computer Technology and Development;2008-12
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved