信息网络安全 ›› 2020, Vol. 20 ›› Issue (3): 9-17.doi: 10.3969/j.issn.1671-1122.2020.03.002

• 等级保护 • 上一篇    下一篇

一种基于拓扑分析的网络攻击流量分流和阻断方法

宋宇波1,2,3(), 樊明1,2,3, 杨俊杰1,2,3, 胡爱群1,2,3   

  1. 1.东南大学网络空间安全学院,南京 211189
    2.江苏省计算机网络技术重点实验室,南京 211189
    3.网络通信与安全紫金山实验室,南京 211189
  • 收稿日期:2019-11-20 出版日期:2020-03-10 发布日期:2020-05-11
  • 作者简介:

    作者简介:宋宇波(1977—),男,江苏,副教授,博士,主要研究方向为网络流量安全分析;樊明(1995—),男,江苏,硕士研究生,主要研究方向为网络流量分析;杨俊杰(1996—),男,辽宁,硕士研究生,主要研究方向为无线设备指纹;胡爱群(1964—),男,江苏,教授,博士,主要研究方向为无线网络安全、无线指纹识别。

  • 基金资助:
    国家自然科学基金[61601113];国家重点研发计划[2018YFB2202200,2018YFB2100403]

Multipath Solution and Blocking Method of Network Attack Traffic Based on Topology Analysis

SONG Yubo1,2,3(), FAN Ming1,2,3, YANG Junjie1,2,3, HU Aiqun1,2,3   

  1. 1. School of Cyber Science and Engineering, Southeast University, Nanjing 211189, China
    2. Jiangsu Key Laboratory of Computer Networking Technology, Nanjing 211189, China
    3. Network Communication and Security Purple Mountain Laboratory, Nanjing 211189, China
  • Received:2019-11-20 Online:2020-03-10 Published:2020-05-11

摘要:

现有的针对流量型网络攻击的防御方法主要是在监测点发现异常后对流量进行阻断,仅能降低所在路径的攻击流量但无法降低整个网络的负载。针对这种情况,文章提出一种基于拓扑分析的网络攻击流量分流和阻断方法,基于拓扑分析从网络全局角度出发实现攻击流量分流阻断。该方法基于多种发现策略获取网络拓扑,在网络攻击阶段采用基于K条最短路径分流的方法实现网络流量分流;同时基于主机行为特征对网络攻击进行溯源,并采用基于流表的报文实时过滤方案进行阻断。实验结果表明,该方法具有系统开销小、鲁棒性好、阻断效率高的特点,实用价值较强。

关键词: 流量攻击, 分流方法, 阻断策略, 拓扑分析, K条最短路径

Abstract:

Current researches mainly block traffic on monitoring points after abnormal detection. However, this scheme can only reduce the attack traffic of the path where it is located, but cannot reduce the load of the entire network. This paper proposes a method of multipath solution and blocking method of network attack traffic based on topology analysis. This method first obtains the network topology based on multiple discovery strategies. This method achieves multipath solution based on K shortest path. At the same time, the source of network attacks is traced based on host behavior characteristics, and a filtering scheme based on flow table is adopted to block. Experiments show that the solution has the characteristics of small system overhead, good robustness, high blocking efficiency, and strong practical value.

Key words: traffic attack, multipath solution, blocking method, topology analysis, K shortest pathes

中图分类号: