資源描述:
《Network Security Situation Evaluation Method》由會員上傳分享,免費在線閱讀,更多相關內(nèi)容在行業(yè)資料-天天文庫。
1、RecentResearchesinMathematicalMethodsinElectricalEngineeringandComputerScienceNetworkSecuritySituationEvaluationMethodforDistributedDenialofService1,21,21,21,21,2JinQi,CuiYiMin,HuangMinHuan,KuangXiaoHui,TangHong1)ScienceandTechnologyonInformationSystemSecurityLaboratory,Beijing,
2、China2)BeijingInstituteofSystemandEngineering,Beijing,Chinakingkey@sohu.comAbstract:-Themeasurementofnetworkcongestionanddegradationofqualityofserviceduringdistributeddenialofserviceattacksremainedanelusivegoal.Thispaperanalyzestheimpactsthatallcongestedlinkscauseonattackvictima
3、ndnetworkarchitecture,introducesthemin-cutsetandpresentsanewmethodtoassessthenetworksecuritysituationunderDDoSattacks,whichcomputestheinfluencevaluethatattackscauseonnetworksecuritysituationaccordingtothedistancebetweenthecongestedlinkandvictimandwhetherthelinkisinthemin-cutset,
4、andthisvalueisusedforquantitativesituationassessment.Theapplicabilityofthismethodisverifiedbysimulatedexperimentswiththenetworksimulationtool.Keywords:-DDoSattacksecuritysituationlinkcongestiondegreemetric1Introductionthesituationevaluationresult,andmakeefficientDistributedDenia
5、lofservice(DDoS)isamajorthreatreaction.today.ItsintendedeffectistopreventlegitimateusersCurrentDoSmeasurementapproachesareconcernedforfromdoingroutinebusinesswiththevictim,bythepartialofthetargetnetworkorcapturetrafficexhaustingsomelimitedresourceviaapacketfloodormeasurementfrom
6、thelowlevelofthenetwork.Thebysendingmalformedpacketsthatcausenetworkperformancedataneedtobeexpressedintermsofelementstocrash.Servicedenialisexperiencedbyusersextractingfromtherawdata.Andseveralfactorsmustasasevereslowdown,servicequalitydegradationorabesynthesized,andthendeduceth
7、eentirenetworkcompletedisruptionofcommunicationwiththevictim.securitysituation.TheamountofdataneedtobeTherearemanyevaluationmethodshavebeencapturedandextractedisverylarge.Itisachallengetoresearched,inordertoanalyzethesecuritysituationdisplaynetworksecuritysituationinrealtime.Oth
8、erunderDDosattacks,andguidesecurityengineerstor