弱关联节点强化下网络泛洪攻击检测方法研究OACSTPCD
Research on detection method for network flooding attacks under weakly correlated node reinforcement
由于网络中泛洪攻击生成的恶意流量常与正常流量在一定程度上具有相似性,使得传统方法将正常流量认定为恶意攻击,定位准确性较低.为此,研究弱关联节点强化下网络泛洪攻击检测方法.构建网络弱关联节点分布模型,结合已知节点和未知节点位置关系,建立弱关联节点快速定位方程,以定位节点位置;将弱关联节点接收报文的周期性作为特征,检测泛洪攻击;通过在检测到泛洪攻击的弱关联节点伪造报警包的方式强化节点,遵循泛洪攻击报文发送的路径回溯,完成泛洪攻击防御.实验结果表明,该…查看全部>>
The malicious traffic generated by flooding attacks in the network is similar to the normal traffic to a certain extent,so the traditional methods usually identify the normal traffic as malicious attacks,which results in low localization accuracy.To this end,a detection method for network flooding attacks under weakly correlated node reinforcement is studied.A distribution model for weakly correlated nodes in the network is built.In combination with the posi…查看全部>>
李晓粉;张兆娟
中国计量大学 信息工程学院,浙江 杭州 310018中国计量大学 信息工程学院,浙江 杭州 310018
电子信息工程
弱关联节点网络泛洪攻击节点强化周期性攻击检测攻击防御通信速率
weakly correlated nodenetworkflooding attacknode reinforcementperiodicityattack detectionattack defensecommunication rate
《现代电子技术》 2024 (7)
100-103,4
浙江省自然科学基金资助项目(LQ22F020021)
评论