基于linux内核的防SYN Flood系统分析与研究

来源 :浙江大学 | 被引量 : 0次 | 上传用户:wgqlogin
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Because of the insecurity of the tcp three-handshake,The TCP/IP protocol,which is the broadest network connection protocol at present,has the connatural limitation.With the rapid development in latter years,network security problems happen frequently.As a consequence,various kinds of attack methods appear ceaselessly.The SYN Flood ,as the representation of DDos attack method,is a newly developed attack method of huge destroying power.The SYN Flood which make use of the connatural limitation of TCP/IP network protocol behave oneself with mighty destruction power and is diffcultly defended.It gives the huge threat to the safeness, integrality and availability of Internet.How to detect and reduce the damage of the SYN Flood attack method gives rise of the extensive focus and becomes the topic of the network security research for now.The SYN COOKIE mechanism bases on the improvement on the traditonal TCP/IP network protocol.Because of the improvement based on the protocol foundation,It makes the aggressive action to defend and reduce the damage of SYN Flood attach method.But because of the complexity of making and verifing the COOKIE and the degradation of the TCP connect reliability,The SYN COOKIE mechanism give large discount when facing the broadscale SYN Flood attack.Aim at this problem,this paper propose a kind of method which is based the separarion of the tcp packets and the SYN COOKIE mechanism.Making use of the self-similarity in tcp packet traffic and Real-time monitor the network traffic on LIBPCAP,It can make the rapid respondence to the occurrence of SYN Flood.And then it make use of the SYN COOKIE mechanism to vertify the legality of the network packets and extract the source IP address information from the legal tcp packets.According to the advantage of HASH table in the rapid search and the characterist of network packet traffic(if a packet from one IP address visited recently,we can beleive that another packet from this IP address will visit again),this paper optimize the traditional IP-HASH table algorithm.The handle accelerate the search to ip address by the method of dynamicupdate to the hash collision chain.The chief characterist of the defend SYN Flood system is the legal packet statistic and feedback to the system accroding to the SYN COOKIE mechanism,it make the system filter out the legal packet rapidlier.Then it can avoid the disadvantage of vertifying any SYN ,ACK packet in the normal way.At last the test declare that the defend system improve the host’s ability to defending the SYN Flood attack at the equal condition.
其他文献
二十世纪九十年代,伴随着第三次科技革命的浪潮的兴起,信息技术和计算机互联网技术得到了飞速的发展,人类迈入了数字信息的时代,多媒体技术成为人们关注的热点之一。多媒体技
近年来随着电力电子技术的发展,电网中的谐波污染越来越严重,为了保证供电系统的安全经济运行,必须控制电网谐波含量。尽管各国颁发的有关控制和限制电力系统谐波的标准早在十多年前已经开始实施,但是由于电力系统的谐波来源有多个方面,PCC处的谐波源分离问题至今还没有得到有效的解决,从而使得有关谐波的标准实际上尚未得到有效地实施。 本文首先对各种谐波源分离方法的基本原理作了探讨和比较,对各种方法的特点进
随着Internet的快速发展,网上的数据量不断增加,人们对网上信息的应用需求也不断提高。但是传统的Web信息查询大多数是基于HTML语言的,由于HTML在语义表示方面上存在一定的缺
本文的研究内容主要是围绕时域有限差分(FDTD)的吸收边界条件和其改进算法—时域交替隐式差分算法(ADI-FDTD)展开的。首先对电磁计算的历史和现状,以及FDTD算法的不足进行了阐