检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:郝帅 白翼铭 李致成 包正晶 Hao Shuai;Bai Yiming;Li Zhicheng;Bao Zhengjing(National Computer System Engineering Research Institute of China,Beijing 102200,China)
出 处:《信息技术与网络安全》2021年第2期7-13,23,共8页Information Technology and Network Security
摘 要:随着计算机和通信技术的高速发展,网络空间维度与现实世界的对照格外清晰,因此安全管理网络空间显得意义重大。针对近年来已公布的网络环境中反射放大型分布式拒绝服务攻击(Distributed Denial of Service, DDoS)安全问题,基于Memcached、 DNS、 NTP、 SNMP、 SSDP和CLDAP六种常见协议对所存在的漏洞进行分析,搭建六种协议的服务器仿真环境,通过使用交互式数据包操作程序scapy编程,实现对仿真环境中目标主机的IP欺骗和带宽放大。通过ZoomEye获取真实网络环境中的可用IP资源,以仿真环境中目标主机IP作为受害者,测试真实环境中可用IP资源产生的欺骗效果和带宽放大倍数,根据实验结果分析反射放大型DDoS的危害并从服务器和受害者两个角度给出防范策略。With the rapid development of computer and communication technology, the contrast between cyberspace dimen-sions and the real world is particularly clear, therefore the security of cyberspace is of great significance. In view of the problem of network security caused by reflection amplification DDoS( Distributed Denial of Service), this paper analyzes the vulnerability based on Memcached, DNS, NTP, SNMP, SSDP and CLDAP protocols, and builds server simulation environment of six protocols. It implements the target in the simulation environment IP spoofing and bandwidth amplification based on interactive packet crafting program. In addition, the IP resources in the real network environment are obtained by ZoomEye. The IP in the simulation environment is taken as the victim to test the spoofing effect and bandwidth mag-nification of IP resources in real network environment. According to the experimental results, the harm of reflection am-plification DDoS is analyzed and the prevention strategies are given from the perspective of server and victim.
关 键 词:网络安全 反射放大 DDOS攻击 IP欺骗 带宽放大
分 类 号:TP309.5[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.222.230.215