메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색

논문 기본 정보

자료유형
학위논문
저자정보

김진 (충북대학교, 충북대학교 대학원)

지도교수
오창석.
발행연도
2013
저작권
충북대학교 논문은 저작권에 의해 보호받습니다.

이용수1

표지
AI에게 요청하기
추천
검색

이 논문의 연구 히스토리 (4)

초록· 키워드

오류제보하기
Recently trend of DDoS attack is migrating to paralysis of application level from lower layers using small amount of traffic. Its pattern is very similar with normal user’s traffic though the number of IP for attack is increasing. The representative instance for attack technologies is GET flooding causing interruption of web services that session load between web and DB server is occurred by large amount of GET requests to access dynamic contents invoking DB in web server after connection phase of TCP. Similar types of attack are CC, circle-CC, Slowloris and RUDY.
Shifting to new attack patterns, various kinds of research for DDoS attack to application layer is proceeding. Especially detection method utilizing IP list of users which characteristic is accessing identical users repetitively according patterns of web service, relatively small resource allocation method to suspicious IP analyzing pattern information concerning web services, distinction method between temporary congestion of request and DDoS attack referencing URL distribution, and threshold based method to HTTP PPS are iconic cases of research.
However the detection method utilizing IP list of users has a possibility to intercept new IP or not frequently appeared IP, and has no counter measure the attack occurring from infection PC of frequently accessing user. Relatively small resource allocation method to suspicious IP is not a fundamental interruption against attackers and threshold based method to HTTP PPS is not effective answer for GET flooding attack generating relatively small amount of traffic. Main idea of statistical detection method such as Entropy and Chi Square Test is using the threshold excess of variable value for normal traffic. Therefore similar attacks with normal traffic could not be detected.
The thesis propose normalization of searching rule in form of tree structure tracing link among web pages in order to detect GET flooding attacks effectively and collection of searching rule table learning normal web pages access based on searching rule in order to detect rapidly. Attacks are detected by comparing repetitive request for dynamic contents with attack characteristics of GET flooding after construction of session tree per each IP accessing specific site based on table information concerning normal searching rule collected and tracking of searching route. And dual trend analysis is adopted for intelligent attacks avoiding the detection method of abnormal route access. Ultimate attack IP is detected referencing reliable interval based on cost value saved in IP session tree table.
The experiment for verification of proposed detection method for DDoS attack using IP session tree was performed about Nocache GET flooding, CC attack and HTTP GET nothing utilizing BackTrack attack tool. The initiation of detection and blocking against attacks is accomplished after 4 minutes from attack beginning and blocking of attacks is completed at 9 minutes and 14 seconds after attack start. The improvement of occupation rate was confirmed. And average of detection rate was 92.51% in case of applying 99% reliable interval in experiment for detection against intelligent GET flooding attack using dual trend analysis and the proposed method was verified that it was specialized to DDoS attack detection of GET flooding type.

Because DDoS attack is evolving more intelligent and modified type gradually, the correspondence to various attack would be considered to be hard. Hereafter further studies for the construction technology of connection tree among web pages and computation method of total cost concerning static contents and dynamic contents per each IP session would be succeed for the performance enhancement of proposed methodology.

목차

Ⅰ. 서 론 1
Ⅱ. GET Flooding 공격 기법 6
2.1 GET Flooding 공격 기법 분석 7
2.2 GET Flooding 공격 탐지 알고리즘 사례 분석 19
2.3 기존 탐지 기법의 문제점 22
Ⅲ. 제안한 GET Flooding 공격 탐지 기법 24
3.1 GET Flooding 공격 탐지 모델 24
3.2 IP Session Tree를 이용한 분석 26
3.3 이중 추이 분석 34
3.4 신뢰구간에 의한 최종 공격 차단 39
Ⅳ. 실험 및 결과 고찰 49
4.1 실험 49
4.2 결과 고찰 51
Ⅴ. 결 론 63
참 고 문 헌 66

최근 본 자료

전체보기

댓글(0)

0