《计算机应用》唯一官方网站 ›› 2026, Vol. 46 ›› Issue (4): 1139-1157.DOI: 10.11772/j.issn.1001-9081.2025040402

• 网络空间安全 • 上一篇    

DDoS攻击防御技术综述

何止戈1, 刘畅2, 吴俊锐1, 罗昊然1, 胡水松1, 汪文勇1()   

  1. 1.电子科技大学 计算机科学与工程学院(网络空间安全学院),成都 611731
    2.清华大学 计算机科学与技术系,北京 100084
  • 收稿日期:2025-04-14 修回日期:2025-08-11 接受日期:2025-08-22 发布日期:2025-12-29 出版日期:2026-04-10
  • 通讯作者: 汪文勇
  • 作者简介:何止戈(1995—),男,四川广汉人,博士研究生,主要研究方向:网络安全、计算机网络、人工智能
    刘畅(1992—),男,江苏扬州人,博士研究生,主要研究方向:网络安全、网络运维、人工智能
    吴俊锐(1993—),男,四川安岳人,博士研究生,主要研究方向:计算机网络体系结构、网络安全
    罗昊然(1999—),男,四川成都人,博士研究生,主要研究方向:网络安全、计算机网络、人工智能
    胡水松(1998—),男,四川泸州人,博士研究生,主要研究方向:网络安全、计算机网络

Review of DDoS attack defense technology

Zhige HE1, Chang LIU2, Junrui WU1, Haoran LUO1, Shuisong HU1, Wenyong WANG1()   

  1. 1.School of Computer Science and Engineering (School of Cyber Security),University of Electronic Science and Technology of China,Chengdu Sichuan 611731,China
    2.Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China
  • Received:2025-04-14 Revised:2025-08-11 Accepted:2025-08-22 Online:2025-12-29 Published:2026-04-10
  • Contact: Wenyong WANG
  • About author:HE Zhige, born in 1995, Ph. D. candidate. His research interests include network security, computer network, artificial intelligence.
    LIU Chang, born in 1992, Ph. D. candidate. His research interests include network security, network operation and maintenance, artificial intelligence.
    WU Junrui, born in 1993, Ph. D. candidate. His research interests include computer network architecture, network security.
    LUO Haoran, born in 1999, Ph. D. candidate. His research interests include network security, computer networks, artificial intelligence.
    HU Shuisong, born in 1998, Ph. D. candidate. His research interests include network security, computer networks.

摘要:

分布式拒绝服务(DDoS)攻击作为一种破坏性极强的网络攻击方式,近年来因具有低廉的攻击成本、较高的攻击收益和较强的隐蔽性,成为网络安全领域最具威胁性和挑战性的问题之一。利用分布式控制方式,DDoS攻击将恶意流量混杂于正常网络请求中,导致传统的入侵检测系统(IDS)和防火墙等安全防护机制难以有效识别和拦截这些攻击。因此,如何高效检测并有效防御DDoS攻击成为网络安全领域的研究热点和难点。在系统性调研现有DDoS相关研究的基础上,首先,梳理DDoS攻击的分类方法,并从多个维度归纳不同类型的DDoS攻击,为更深入地理解DDoS攻击机理提供帮助;其次,分析当前DDoS攻击的发展情况,重点探讨攻击强度、攻击手段和攻击分布的发展趋势,为研究更高效的DDoS防御技术提供支持;再次,从工业和学术两个维度深入分析和评估当前DDoS攻击防御技术的现状;其中,在学术方面重点梳理基于可编程交换机和机器学习的DDoS检测与防御方法,在工业方面则对比分析DDoS防御的不同参与方所采用的防御架构,总结各类防御架构的技术特点、应用场景和存在的挑战;最后,基于当前DDoS攻击态势的综合分析,展望未来DDoS防御技术的发展方向和面临的机遇与挑战,为网络安全领域的研究者提供新的思路和方向,推动DDoS防御技术的进一步创新和发展。

关键词: 分布式拒绝服务攻击, 攻击分类, 防御方法, 可编程交换机, 机器学习

Abstract:

Distributed Denial of Service (DDoS) attacks, as a highly destructive type of cyber attacks, have become one of the most severe threats and challenges in the field of cybersecurity in recent years due to their low attack costs, high attack efficiency, and strong concealment. DDoS attacks employ a distributed control approach to mix malicious traffic with legitimate network requests, making it difficult for traditional security defense mechanisms such as Intrusion Detection System (IDS) and firewalls to identify and mitigate such attacks effectively. Consequently, the efficient detection and effective defense against DDoS attacks have become research hotspots and difficulties in the field of cybersecurity. Based on systematic survey of the existing research on DDoS attacks, the following was performed. Firstly, the classification methods of DDoS attacks were sorted out, and DDoS attacks were summed up from multiple perspectives, so as to provide a deeper understanding of DDoS attack mechanisms. Secondly, an analysis of the current development of DDoS attacks was conducted, with particular focuses on discussing the development trends in attack intensity, attack methods, and attack distribution, thereby providing support for the research on more efficient DDoS defense technologies. Thirdly, an in-depth analysis and evaluation of the status of DDoS attack defense technologies was conducted from both industrial and academic perspectives, which focused on DDoS detection and defense methods based on programmable switches and machine learning in the academic aspect, and compared and analyzed the defense architectures adopted by different participants in DDoS defense in the industrial aspect as well as summarized the technical characteristics, application scenarios, and the existing challenges of the architecture. Finally, based on a comprehensive analysis of the current DDoS attack situations, the future development directions, opportunities, and challenges of DDoS defense technology were prospected, providing new ideas and directions for researchers in the field of cybersecurity and promoting further innovation and development of DDoS defense technology.

Key words: Distributed Denial of Service (DDoS) attack, attack classification, defense method, programmable switch, machine learning

中图分类号: