دانلود رایگان مقاله انگلیسی توسعه الگوریتم برای محافظت در برابر حملات DDoS امواج پالسی - IEEE 2018

عنوان فارسی
توسعه الگوریتم برای محافظت در برابر حملات DDoS امواج پالسی
عنوان انگلیسی
Development of the Algorithm for Protection against DDoS-Attacks of Type Pulse Wave
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
3
سال انتشار
2018
نشریه
آی تریپل ای - IEEE
فرمت مقاله انگلیسی
PDF
کد محصول
E7861
رشته های مرتبط با این مقاله
مهندسی کامیپوتر، فناوری اطلاعات
گرایش های مرتبط با این مقاله
الگوریتم ها و محاسبات، امنیت اطلاعات، شبکه های کامپیوتری
مجله
کنفرانس پژوهشگران جوان روسی در مهندسی برق و الکترونیک - Conference of Russian Young Researchers in Electrical and Electronic Engineering
دانشگاه
Department of Computer Systems and Technologies - National Research Nuclear University MEPhI - Moscow - Russia
کلمات کلیدی
شبکه؛ DDoS؛ DPI
چکیده

Abstract


Protection from DDoS-attacks is one of the most urgent problems in the world of network technologies. And while protect systems has algorithms for detection and preventing DDoS attacks, there are still some unresolved problems. This article is devoted to the DDoS-attack called Pulse Wave. Providing a brief introduction to the world of network technologies and DDoS-attacks, in particular, aims at the algorithm for protecting against DDoS-attack Pulse Wave. The main goal of this article is the implementation of traffic classifier that adds rules for infected computers to put them into a separate queue with limited bandwidth. This approach reduces their load on the service and, thus, firewall neutralises the attack.

بخشی از متن مقاله

IV.IMPLEMENTATION OF THE ATTACK


Then the attack on the server was simulated. To simulate a large number of attacking bots these python modules have been used in the network, as a subprocess and multiprocessing, with the help of which a copy of the process simulating the attack of the botnet nodes on the server was created. The results of the attack presented are graphs of CPU load and the number of unique IP addresses of senders (Fig. 4- 5).


At the moment of the beginning of the attack, the network sharply increases activity, the number of unique IP per unit time, it is these IP it was decided to mark suspicious. A sharp increase in the number of unique IP serves as a signal to the system that an attack has begun. Based on this information the binary IP address classifier was implemented, which allocates 2 classes based on network activity analysis: user requests and botnet requests. Blocking the botnet requests marked thus allowed to reduce the load on the server, avoiding for the most part the damage a from the attack.


بدون دیدگاه