• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2011, Vol. 33 ›› Issue (4): 1-7.doi: 10.3969/j.issn.1007130X.2011.

• 论文 •    下一篇

基于改进AAR模型的DIDoS攻击早期检测方法

刘运,殷建平,程杰仁,蔡志平   

  1. (国防科学技术大学计算机学院,湖南 长沙 410073)
  • 收稿日期:2010-05-20 修回日期:2010-10-26 出版日期:2011-04-25 发布日期:2011-04-25
  • 作者简介:刘运(1979),男,湖南怀化人,博士生,研究方向为网络安全和人工智能。
  • 基金资助:

    国家自然科学基金资助项目(60603062);湖南省教育厅资助科研项目(07C718);湖南省自然科学基金资助项目(06JJ3035);公安部应用创新计划(2007YYCXHNST072)

Distributed IncreasingRate DenialofService  Attacks Based on an Improved AAR Model

LIU Yun,YIN Jianping,CHENG Jieren,CAI Zhiping   

  1. (School of Computer Science,National University of Defense Technology,Changsha 410073,China)
  • Received:2010-05-20 Revised:2010-10-26 Online:2011-04-25 Published:2011-04-25

摘要:

分布式增速拒绝服务(DIDoS)攻击采用逐步提升发包速率的方式来造成受害者资源的慢消耗,较之传统的分布式拒绝服务(DDoS)攻击更具隐蔽性,如何尽可能早地将其捕获是一个亟待研究的问题。本文针对DIDoS攻击的特点,提出了一种基于改进AAR模型的DIDoS攻击早期检测方法。为此,首先提出了一组基于条件熵的检测特征:流特征条件熵(TFCE),用以反映DIDoS攻击流速的增长变化;然后根据改进的AAR模型对TFCE值进行多步预测;最后采用经过训练的SVM分类器对预测值进行分类,以识别攻击企图。实验结果表明,在保证检测精度相当的前提下,该方法比部分现有方法能够更快检测到攻击。

关键词: 分布式增速拒绝服务攻击, 流特征条件熵, 自适应自回归, 支持向量机

Abstract:

Distributed Increasingrate DenialofService (DIDoS) attacks gradually increase the sending rate of packets to exhaust the victim’s resources slowly, so DIDoS attacks have a higher concealment than the traditional DDoS attacks. How to detect DIDoS attacks as soon as possible is an urgent problem we should study. In view of the characteristics of DIDoS attacks, a novel approach for early detection based on an improved adaptive autoregressive (AAR) model is proposed. In this approach, a set of novel detection features based on the conditional entropy called the  Traffic Feature Conditional Entropy (TFCE), are used to reflect the increase of DIDoS attack traffic rate. Then an improved AAR model is used to predict the multistep TFCE values. Finally a trained SVM classifier is adopted to identify the tendency of attacks by classifying the predicted TFCE values. The experimental results demonstrate that our approach can not only guarantee the comparative precision of detection but also detect DIDoS attacks more quickly than some existing approaches.

Key words: distributed increasingrate denialofservice attack;flow connection