{"title":"基于网络行为特征的分布式ddos攻击设计新方法","authors":"Xiao-ming LIU , Qi LI","doi":"10.1016/S1005-8885(13)60221-6","DOIUrl":null,"url":null,"abstract":"<div><p>This paper designs a distributed low-rate denial of service (LDoS) attack using one-dimensional random walk algorithm. One-dimensional random walk algorithm can be used in generating power-law distribution which complies with normal network behavior feature. In this attack pattern, the behavior of each distributed attack flows are normal and nonperiodic, while the aggregated effect has the same damage degree as traditional square wave LDoS attacks. As the distributed attack flow satisfies the network traffic behavior feature, it is even more difficult to detect and trace back attack sources. The study on the feature of this attack provides reference for distributed low-rate DoS attack countermeasures.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 54-59"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60221-6","citationCount":"1","resultStr":"{\"title\":\"On a novel method of designing distributed LDoS attack based on network behavior features\",\"authors\":\"Xiao-ming LIU , Qi LI\",\"doi\":\"10.1016/S1005-8885(13)60221-6\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>This paper designs a distributed low-rate denial of service (LDoS) attack using one-dimensional random walk algorithm. One-dimensional random walk algorithm can be used in generating power-law distribution which complies with normal network behavior feature. In this attack pattern, the behavior of each distributed attack flows are normal and nonperiodic, while the aggregated effect has the same damage degree as traditional square wave LDoS attacks. As the distributed attack flow satisfies the network traffic behavior feature, it is even more difficult to detect and trace back attack sources. The study on the feature of this attack provides reference for distributed low-rate DoS attack countermeasures.</p></div>\",\"PeriodicalId\":35359,\"journal\":{\"name\":\"Journal of China Universities of Posts and Telecommunications\",\"volume\":\"20 \",\"pages\":\"Pages 54-59\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60221-6\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of China Universities of Posts and Telecommunications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1005888513602216\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of China Universities of Posts and Telecommunications","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1005888513602216","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Computer Science","Score":null,"Total":0}
On a novel method of designing distributed LDoS attack based on network behavior features
This paper designs a distributed low-rate denial of service (LDoS) attack using one-dimensional random walk algorithm. One-dimensional random walk algorithm can be used in generating power-law distribution which complies with normal network behavior feature. In this attack pattern, the behavior of each distributed attack flows are normal and nonperiodic, while the aggregated effect has the same damage degree as traditional square wave LDoS attacks. As the distributed attack flow satisfies the network traffic behavior feature, it is even more difficult to detect and trace back attack sources. The study on the feature of this attack provides reference for distributed low-rate DoS attack countermeasures.