LDDoS attack time synchronization and flow convergence method based on cross correlation

A technology of time synchronization and traffic aggregation, applied in digital transmission systems, electrical components, transmission systems, etc., can solve the problems of lack of actual data, staying in theory and simulation, etc.

Inactive Publication Date: 2014-10-29
CIVIL AVIATION UNIV OF CHINA
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

LDDoS has not exploded on a large scale in the network at present, and most of the research on it is still in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • LDDoS attack time synchronization and flow convergence method based on cross correlation
  • LDDoS attack time synchronization and flow convergence method based on cross correlation
  • LDDoS attack time synchronization and flow convergence method based on cross correlation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] 1. In the attached image 3In the simulated LDDoS scenario, there are two routers A and B, 5 legitimate TCP senders (nodes 1-5), 5 attackers (nodes 6-10), and 5 TCP receivers (nodes 11-15) . The bandwidth of the bottleneck link between routers A and B is 10Mbps. The detailed parameters are shown in the table below:

[0029]

RTT(ms)

Bandwidth (Mb)

Node 1 to A

10

100

Node 2 to A

50

100

Node 3 to A

100

100

Node 4 to A

150

100

Node 5 to A

200

100

Nodes 6-10 to A

5

100

Node A to B

50

20

Node B to 11

10

100

Node B to 12

50

100

Node B to 13

100

100

Node B to 14

150

100

Node B to 15

200

100

[0030] Here we select the attack parameters of pulse period T=1000ms, pulse length L=250ms, and pulse amplitude R=20Mb as the finally converged waveform of the multi-source LDDoS attac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an LDDoS attack time synchronization and flow convergence method based on cross correlation. The invention relates to flow convergence and time synchronization of LDDoS (Low-rate Distributed Denial of Service) attacks. The LDDoS attacks are formed through gathering of a large quantity of organized LDDoS attacks. A signal cross correlation algorithm aims at ensuring that each distributed attack pulse is gathered and accurately synchronized at a sufferer end so as to form a powerful pulse. A simulation result shows that an LDDoS attack effect of attack pulses adjusted through a signal cross correlation algorithm is significantly reinforced.

Description

technical field [0001] The invention relates to a low-rate denial of service LDDoS (Low-rate Distributed Denial of Service) attack method, which improves the effect of the LDDoS attack. It belongs to the technical field of intrusion detection (Intrusion Detection) in the field of computer network security. Background technique [0002] A denial of service attack is a brute force attack that prevents network devices such as hosts, servers, and routers under attack from providing or receiving services normally. The attacker occupies a large amount of network resources (such as network bandwidth or CPU cycles) by sending a large number of worthless data packets to the victim, so as to achieve the purpose of making the victim's host system unable to operate normally or even paralyzed. For the victim whose index is not high, the effect of DoS attack will be better and more obvious. Implementing DoS attacks does not require very complicated skills, and with the improvement of so...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/891H04L47/41
Inventor 吴志军马兰岳猛
Owner CIVIL AVIATION UNIV OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products