计算机应用 ›› 2009, Vol. 29 ›› Issue (11): 2964-2968.

• 信息与网络安全 • 上一篇    下一篇

混合型网络中DDoS攻击的入侵扫描研究

张凯1,钱焕延2,徐延贵2   

  1. 1. 南京理工大学
    2.
  • 收稿日期:2009-05-25 修回日期:2009-07-15 发布日期:2009-11-26 出版日期:2009-11-01
  • 通讯作者: 张凯
  • 基金资助:
    国防科工委应用基础资金资助项目

Research on scanning strategy of DDoS attack in hybrid networks

Kai ZHANG,Huan-yan QIAN,Yan-gui XU   

  • Received:2009-05-25 Revised:2009-07-15 Online:2009-11-26 Published:2009-11-01
  • Contact: Kai ZHANG

摘要: 现有网络中网络地址转换(NAT)的存在使得其后网络中的主机对外部网络变得不可见,IPv6庞大的地址空间也使得攻击者利用传统的随机地址扫描策略很难找到有漏洞主机。概述当前DDoS攻击的基本原理,具体分析了随着因特网体系结构的变化,网络NAT等设施的出现对DDoS攻击所带来的影响。针对传统理论在研究DDoS攻击过程中的一些不足,提出了一种基于搜索引擎技术和Teredo服务的新型扫描策略,以及对NAT后主机实施DDoS攻击的具体方法。仿真实验证明这种新型DDoS入侵攻击更加有效,对复杂网络环境的适应性也更强。

关键词: 网络地址转换, Teredo服务, 搜索引擎, bubble-to-open程序

Abstract: The technology of Network Adress Translator (NAT) is widely used in the Internet. With this technology, computers set behind the NAT are separated to the external net. Attacker can hardly find and invade those computer behind the NAT by the conventional technique. Some principles of DDoS attack were briefly introduced and a concrete analysis about the effect of NAT on DDoS attack was given. To overcome the weakness of traditional mode in describing the propagation of DDoS attack, a new scanning strategy based on the Teredo technology and search engines was presented. Attacker could more rapidly invade computers set behind the NAT and use those computers more efficiently to actualize the DDoS attack. Compared with the conventional invasive methods, the simulation results show that the new method is more effective and feasible.

Key words: Network Address Translation (NAT), Teredo service, search engine, bubble-to-open program