CN104348794B - Network layer DDOS attack source discrimination, apparatus and system - Google Patents

Network layer DDOS attack source discrimination, apparatus and system Download PDF

Info

Publication number
CN104348794B
CN104348794B CN201310325923.XA CN201310325923A CN104348794B CN 104348794 B CN104348794 B CN 104348794B CN 201310325923 A CN201310325923 A CN 201310325923A CN 104348794 B CN104348794 B CN 104348794B
Authority
CN
China
Prior art keywords
address
source
attack
server
detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310325923.XA
Other languages
Chinese (zh)
Other versions
CN104348794A (en
Inventor
罗喜军
陈勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tencent Computer Systems Co Ltd
Original Assignee
Shenzhen Tencent Computer Systems Co Ltd
Filing date
Publication date
Application filed by Shenzhen Tencent Computer Systems Co Ltd filed Critical Shenzhen Tencent Computer Systems Co Ltd
Priority to CN201310325923.XA priority Critical patent/CN104348794B/en
Publication of CN104348794A publication Critical patent/CN104348794A/en
Application granted granted Critical
Publication of CN104348794B publication Critical patent/CN104348794B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention provides a kind of network layer DDOS attack source discrimination, it include: detection service device when monitoring first server by DDOS attack, DDOS attack packet is obtained from first server, extract the attack source IP address in DDOS attack packet and attacks the ttl value of source IP address;The probe instructions comprising attack source IP address are sent to second server;The probe response packet that second server is returned according to probe instructions is received, the detection source IP address in probe response packet is extracted and detects the ttl value of source IP address;And judge to attack whether the ttl value of source IP address and the difference of the ttl value of detection source IP address are greater than preset value, if so, determining that attack source IP address is the IP address forged, if not, it is determined that attack source IP address is true IP address.In addition, the present invention also provides a kind of network layer DDOS attack identifing source apparatus and systems.Above-mentioned network layer DDOS attack source discrimination, apparatus and system can rapidly and efficiently identify network layer DDOS attack source.

Description

Network layer DDOS attack source discrimination, apparatus and system
Technical field
The present invention relates to computer communication technology field more particularly to a kind of network layer DDOS attack source discriminations, dress It sets and system.
Background technique
DOS(Denial of Service, refusal service) attack, refer to that one kind can cause server that can not provide normally The attack of service.The most common dos attack has network bandwidth to attack and is connected to sexual assault.Wherein bandwidth attack refers to greatly to lead to Traffic impacts network, so that all available network resources are all consumed and totally finally result in legal user's request and can not pass through. Connection sexual assault, which refers to, impacts server with a large amount of connection request, so that all available operating-system resources are all consumed nearly To the greatest extent, final server can not reprocess the request of legitimate user.
DDOS(Distributed Denial of Service, distributed denial of service) attack refer to by means of client End/server technology, multiple client is joined together as Attack Platform, starts dos attack to one or more targets.It is logical Often, DDOS primary control program is mounted in a client by attacker using a stealing account number, and primary control program is in preset time It is communicated with multiple broker programs in the multiple client of a large amount of installations on the internet, utilizes client/server skill Art, primary control program activate hundreds and thousands of secondary broker programs to make its offensive attack in seconds, attack so as to double up DOS The power hit.
DDOS attack can be divided into network layer DDOS(Net-DDOS by targeted network layer is attacked) attack and App-DDOS attack.Wherein the leakage of existing low layer (including IP layers and TCP layer) agreement is mainly utilized in Net-DDOS attack Offensive attack is carried out in hole, and typical attack pattern includes sending a large amount of attacks to destination host using the attack node for forging IP address Grouping, such as: TCP(Transmission Control Protocol, transmission control protocol) grouping, ICMP(Internet Control Messages Protocol, internet letter report control protocol) grouping, UDP(User Datagram Protocol, User Datagram Protocol) grouping etc., keep destination server maintenance one very big half-open using the three-way handshake mechanism of TCP It puts connection list and consumes very more CPU(Central Processing Unit, central processing unit) and memory source, most Cause system crash that can not provide service for normal users because of stack overflow eventually.It is special that network layer DDOS attack is based on its agreement Property, mass data packet is sent in the case where not needing and establishing and be reliably connected with server, so that existing in terms of attack is traced to the source Biggish difficulty.The general method of industry is by the cooperation with operator, in Metropolitan Area Network (MAN), the egress router of backbone network at present The upper source tracking for carrying out flow, to determine the true and false of attack source.However, the routing device of operator is generally using based on stream Statistical counting mode, this statistical counting mode counts effectively, but for distributed small stream the DDOS of big flow It is then invalid to measure DDOS attack, can not effectively track the true attack source of small flow DDOS attack.
Summary of the invention
In view of this, the present invention provides a kind of network layer DDOS attack source discrimination, apparatus and system, can quickly have The true and false in effect ground identification network layer DDOS attack source.
A kind of network layer DDOS attack source discrimination, comprising: detection service device monitor first server by When DDOS attack, DDOS attack packet is obtained from the first server, extracts the attack source IP address in the DDOS attack packet With the ttl value of the attack source IP address;The probe instructions comprising the attack source IP address are sent to second server, it is described Second server and the first server are in together in a network topology, and the probe instructions are used to indicate second clothes Business device detects the attack source IP address;The second server is received to be rung according to the detection that the probe instructions return It should wrap, extract the ttl value of the detection source IP address and the detection source IP address in the probe response packet;And described in judgement Whether the difference for attacking the ttl value of source IP address and the ttl value of the detection source IP address is greater than preset value, if so, determining The attack source IP address is the IP address forged, if not, it is determined that the attack source IP address is true IP address.
A kind of network layer DDOS attack source discrimination, comprising: detection service device monitor first server by When DDOS attack, DDOS attack packet is obtained from the first server, extracts the attack source IP address in the DDOS attack packet With the ttl value of the attack source IP address;It includes the attack source IP address that the detection service device is sent to second server Probe instructions, the second server and the first server be in together in a network topology, and the probe instructions are used The attack source IP address is detected in the instruction second server;The second server refers to according to the detection It enables, the attack source IP address is detected, obtain probe response packet from the corresponding terminal of the attack source IP address, and will The probe response packet is sent to the detection service device;And the detection service device extracts the spy in the probe response packet The ttl value for surveying source IP address and the detection source IP address judges the ttl value and the detection source IP of the attack source IP address Whether the difference of the ttl value of address is greater than preset value, if so, determine that the attack source IP address is the IP address forged, if It is no, it is determined that the attack source IP address is true IP address.
A kind of network layer DDOS attack identifing source device is applied to detection service device characterized by comprising DDOS is attacked Packet acquisition and analysis module are hit, for being obtained from the first server when monitoring first server by DDOS attack DDOS attack packet extracts the ttl value of the attack source IP address and the attack source IP address in the DDOS attack packet;Detection refers to Sending module is enabled, is analyzed described in acquisition for being obtained to second server transmission comprising the DDOS attack packet with analysis module The probe instructions of source IP address are attacked, the second server and the first server are in together in a network topology, institute It states probe instructions and is used to indicate the second server and the attack source IP address is detected;Probe response packet analyzes mould Block, the detection returned for receiving the second server according to the probe instructions that the probe instructions sending module is sent Response bag extracts the ttl value of the detection source IP address and the detection source IP address in the probe response packet;Judgment module, For judging that the DDOS attack packet obtains and the ttl value of the attack source IP address of analysis module analysis acquisition and the spy Whether the difference for surveying the ttl value for the detection source IP address that response packet analysis module analysis obtains is greater than preset value, if so, Determine that the attack source IP address is the IP address forged, if not, it is determined that the attack source IP address is true IP address.
A kind of network layer DDOS attack identifing source system characterized by comprising such as any one of claim 6 to 9 Detection service device, first server and the second server;The first server is used for according to the detection service The request for the acquisition DOOS attack package that device is sent, is sent to the detection service device for DDOS attack packet;The second server The probe instructions for being sent according to the detection service device detect the attack source IP address, attack from described It hits the corresponding terminal of source IP address and obtains probe response packet, and the probe response packet is sent to the detection service device;Its In, the second server and the first server are in together in a network topology.
In above-mentioned network layer DDOS attack source discrimination, apparatus and system, monitored by detection service device When first server is by DDOS attack, using the second server being in first server in same network topology to DDOS Attack source is reversely detected, at the same using ttl value characteristic, by comparing DDOS attack source source IP address ttl value with The ttl value for detecting source IP address, can rapidly and efficiently identify the true and false of network layer DDOS attack source IP address.
For above and other objects, features and advantages of the invention can be clearer and more comprehensible, preferred embodiment is cited below particularly, And cooperate institute's accompanying drawings, it is described in detail below.
Detailed description of the invention
Fig. 1 is the applied environment figure of network layer DDOS attack source discrimination provided by the invention.
Fig. 2 is the flow chart for the network layer DDOS attack source discrimination that first embodiment of the invention provides.
Fig. 3 is the flow chart for the network layer DDOS attack source discrimination that second embodiment of the invention provides.
Fig. 4 is the flow chart for the network layer DDOS attack source discrimination that third embodiment of the invention provides.
Fig. 5 is the structural schematic diagram for the detection service device that fourth embodiment of the invention provides.
Fig. 6 is the structural schematic diagram for the detection service device that fifth embodiment of the invention provides.
Fig. 7 is the schematic diagram for the network layer DDOS attack identifing source system that sixth embodiment of the invention provides.
Specific embodiment
Further to illustrate that the present invention is the technical means and efficacy realizing predetermined goal of the invention and being taken, below in conjunction with Attached drawing and preferred embodiment, to specific embodiment, structure, feature and its effect according to the present invention, detailed description is as follows.
Referring to Fig. 1, showing the applied environment figure of network layer DDOS attack source discrimination provided by the invention.Such as figure Shown in 1, first server 101, first server 102, detection service device 103 are located in wirelessly or non-wirelessly network, pass through the nothing Line or cable network, first server 101 are in communication with each other with monitoring server 103 respectively with second server 102, and above-mentioned first Server 101, first server 102 and detection service device 103 constitute network layer DDOS attack identifing source system 100 together. It should be understood that first server 101 is also possible to the personal computer as client.Attacker's device clusters 200 be by The device clusters that multiple stage computers are constituted, attacker's device clusters 200 also are located in wirelessly or non-wirelessly network, by this it is wireless or Cable network starts DDOS attack to first server 101.
First embodiment
Referring to Fig. 2, showing the process of the network layer DDOS attack source discrimination of first embodiment of the invention offer Figure.As shown in Fig. 2, the embodiment describes the process flow of detection service device, and in conjunction with Fig. 1, network provided in this embodiment Layer DDOS attack source discrimination the following steps are included:
Step 21, detection service device is obtained when monitoring first server by DDOS attack from the first server DDOS attack packet is taken, the ttl value of the attack source IP address and the attack source IP address in the DDOS attack packet is extracted.
Specifically, the first clothes of data traffic information monitoring that detection service device 103 passes through real time monitoring first server 101 Whether device be engaged in by DDOS(Distributed Denial of Service, distributed denial of service) attack, when monitoring the When one server 101 is by DDOS attack, namely when monitoring 101 data traffic exception of first server, such as: there is big stream There is the TCP(Transmission Control Protocol largely waited in amount hash or first server 101, transmits Control protocol) connection when, from first server 101 obtain DDOS attack packet, and to the DDOS attack packet of acquisition carry out The attack source IP(Internet Protocol in DDOS attack packet, network protocol are extracted in analysis) address and attack source IP The TTL(Time To Live of address, life span) value.
TTL is a value in IP agreement packet, is arranged by transmission host, for preventing data packet constantly in the internet IP On never terminate ground circulation, as soon as initial imagination be determine a time range, be more than this time packet abandon, due to each Router all at least subtracts one TTL field, and TTL usually indicates to wrap the router number that most multipotency passes through before being dropped.Work as note When counting to 0, router determines to abandon the packet, and sends an ICMP(Internet Control Messages Protocol, Internet letter report control protocol) message give initial sender.The initial value of TTL is usually default value, is 8 in packet header Domain.
Step 22, the probe instructions comprising the attack source IP address, the second server are sent to second server It is in together in a network topology with the first server.
Specifically, the selection of detection service device 103 is in any one clothes under identical topological network with first server 101 Device be engaged in as second server 102, sends probe instructions to the second server 102, includes in step 21 in the probe instructions Attack source IP address included in the DDOS attack packet of acquisition, be used to indicate 102 pairs of attack source IP address of second server into Row detection.
It should be understood that the characteristic based on TTL, first server 101 and second server 102 are in identical topological network Under network namely first server 101 is under the same interchanger with second server 102 or IP address is neighbouring, such ability Ensure that the detection result of 102 pairs of second server attack source IP address is comparable, and then ensures DDOS attack identifing source Accuracy.
Step 23, the probe response packet that the second server is returned according to the probe instructions is received, the spy is extracted Survey the ttl value of the detection source IP address and the detection source IP address in response bag.
Specifically, detection service device receives the probe response packet that second server 102 is returned according to probe instructions, and analysis is simultaneously Obtain the ttl value of the detection source IP address and the detection source IP address in the probe response packet.
Step 24, judge it is described attack source IP address ttl value and it is described detection source IP address ttl value difference whether Greater than preset value.
Specifically, the characteristic of binding operation system ttl value, such as: the initial TTL value of windows operating system is generally 128, the initial TTL value of (SuSE) Linux OS is generally 64, will attack the TTL of the ttl value and detection source IP address of source IP address The difference of value is compared with preset value, judges that the difference of the ttl value and the ttl value of detection source IP address of attacking source IP address is It is no to be greater than preset value.Preferably, preset value 5.
Due to the characteristic of the transmission path of ttl value energy effective marker data packet, when attacker carries out DDOS using stochastic source When attack, although cook source address has been used to be attacked, attacker can not be between forgery attack host and destination host Positional relationship, regardless of attacker forges source IP address, the Attacking Packets come from the same attack source will be by the same road Victim is reached by path, therefore DDOS is identified by the ttl value of comparison attack source IP address and the ttl value of detection source IP address The true and false of attack source, compared with the existing technology in traced layer by layer by relevant information table on the router of operator, more Efficiently.
If so, thening follow the steps 25: determining that the attack source IP address is the IP address forged.
It should be understood that obtained since probe response packet is second server 102 from the corresponding terminal of attack source IP address, Therefore detection source IP address is consistent with attack source IP address, and the ttl value for detecting source IP address is the true ttl value of attack source IP. If the difference for attacking the ttl value of source IP address and the ttl value of detection source IP address is greater than preset value, it can confirm that the DDOS is attacked Hitting packet is not to be sent by the corresponding terminal of attack source IP address, and attack source IP address is the IP address forged.
If it is not, thening follow the steps 26: determining that the attack source IP address is true IP address.
Network layer DDOS attack source discrimination provided in an embodiment of the present invention is monitoring first by detection service device When server is by DDOS attack, using the second server being in first server in same network topology to DDOS attack Source is reversely detected, while using the characteristic of ttl value, ttl value and detection by comparing the source IP address in DDOS attack source The ttl value of source IP address can rapidly and efficiently identify the true and false of network layer DDOS attack source IP address.
Second embodiment
Referring to Fig. 3, showing the process of the network layer DDOS attack source discrimination of second embodiment of the invention offer Figure.As shown in figure 3, the embodiment describes the process flow of first server, and in conjunction with Fig. 1, network provided in this embodiment Layer DDOS attack source discrimination the following steps are included:
Step 31, detection service device is when monitoring first server by DDOS attack, Xiang Suoshu first server hair Send the request for obtaining all DOOS attack packages.
Step 31 specifically please refers to the corresponding contents of first embodiment, and details are not described herein again.
Step 32, all DDOS attack packets that the first server is returned according to the request are received.
Specifically, the request for all DOOS attack packages of acquisition that first server 101 is sent according to detection service device 103, Start full dose packet capturing, the current all DOOS attack packages of crawl, and all DOOS attack packages of crawl are sent to detection clothes Business device 103.
Step 33, DPI analysis is carried out to all DDOS attack packets, is obtained in all DDOS attack packets respectively Attack the ttl value of source IP address and the attack source IP address.
DPI(Deep Packet Inspection, deep packet inspection technical), it is a kind of flow detection based on application layer And control technology, the technology briefly namely packet-by-packet analyzed, detected.DPI detection technique is the prior art, herein no longer It repeats.
Specifically, due to DDOS attack detection service device 103 using DPI detection technique to the first server received The 101 all DDOS attack packets returned are analyzed, and are obtained attack source IP address in all DDOS attack packets respectively and are attacked The ttl value for hitting source IP address extracts attack source and its attacks the distribution of ttl value.
Step 34, the probe instructions comprising all attack source IP address are sent to second server.
Specifically, the selection of detection service device 103 is in any one clothes under identical topological network with first server 101 Device be engaged in as second server 102, sends probe instructions to the second server 102, includes in step 303 in the probe instructions The IP address in all DDOS attack sources extracted is used to indicate second server 102 to the IP in all DDOS attack sources Location successively carries out PING detection.
Step 35, all probe response packets that the second server is returned according to the probe instructions are received.
Specifically, probe response packet by second server 102 according to probe instructions, to attack source IP using PING order It when location is detected, is obtained from the corresponding terminal of attack source IP address, second server 102 will be detected by PING to be owned Probe response packet return to detection service device 103.
Step 36, DPI analysis is carried out to all probe response packets, is extracted in all probe response packets respectively Attack the ttl value of source IP address and the attack source IP address.
Specifically, detection service device 103 carries out DPI analysis to all probe response packets that second server 102 returns, Extract the attack source IP address in all probe response packets and its TTL distribution.
Step 37, judge it is described attack source IP address ttl value and it is described detection source IP address ttl value difference whether Greater than preset value.
Specifically, since the attack source IP address with a DDOS attack may have multiple, corresponding detection source IP Location also has multiple, and detection service device 103 is one by one by the ttl values and its corresponding detection source IP of multiple attack source IP address The ttl value of location is compared, and judges the ttl value and its corresponding detection source IP address of multiple attack source IP address respectively Whether the difference of ttl value is greater than preset value.Preferably, preset value can be 5.
If so, thening follow the steps 38: determining that the attack source IP address is the IP address forged.
Step 38 specifically please refers to the corresponding contents of first embodiment, and details are not described herein again.
If it is not, thening follow the steps 39: determining that the attack source IP address is true IP address.
Network layer DDOS attack source discrimination provided in an embodiment of the present invention is monitoring first by detection service device When server is by DDOS attack, using the second server being in first server in same network topology to DDOS attack Source is reversely detected, while using the characteristic of ttl value, ttl value and detection by comparing the source IP address in DDOS attack source The ttl value of source IP address can rapidly and efficiently identify the true and false of network layer DDOS attack source IP address.
3rd embodiment
Referring to Fig. 4, showing the process of the network layer DDOS attack source discrimination of third embodiment of the invention offer Figure.As shown in figure 4, the embodiment describes the process flow of user terminal, and in conjunction with Fig. 1, network layer provided in this embodiment DDOS attack source discrimination the following steps are included:
Step 41, detection service device is sent when monitoring first server by DDOS attack to first server DDOS attack packet acquisition request.
Specifically, the first clothes of data traffic information monitoring that detection service device 103 passes through real time monitoring first server 101 Whether device be engaged in by DDOS(Distributed Denial of Service, distributed denial of service) attack, when monitoring the When one server 101 is by DDOS attack, namely when monitoring 101 data traffic exception of first server, such as: there is big stream There is the TCP(Transmission Control Protocol largely waited in amount hash or first server 101, transmits Control protocol) when connection, DDOS attack packet acquisition request is sent to first server, request first server 101 is complete Amount crawl DDOS attack packet, and all DDOS attack packets of crawl are returned into detection service device 103.
Step 42, first server obtains DDOS attack packet according to acquisition request, and DDOS attack packet is returned to detection Server.
Specifically, the acquisition request that first server 101 is sent according to detection service device 103, full dose crawl currently by All DDOS attack packets, and all DDOS attack packets of crawl are returned into detection service device 103.
Step 43, the analysis of detection service device obtains the attack source IP address in DDOS attack packet and attacks source IP address Ttl value.
Specifically, detection service device 103 carries out DPI(Deep to all DDOS attack packets that first server 101 returns Packet Inspection, deep packet inspection technical) analysis, extract attack source IP address in all DDOS attack packets with Attack the distribution of the ttl value of source IP address.
Step 44, detection service device sends the probe instructions comprising attack source IP address to second server.
Specifically, the selection of detection service device 103 is in any one clothes under identical topological network with first server 101 Device be engaged in as second server 102, sends probe instructions to the second server 102, includes all in the probe instructions The IP address in DDOS attack source is used to indicate second server 102 and successively visits to the IP address in all DDOS attack sources It surveys.
Step 45, second server detects attack source IP address according to probe instructions, from attack source IP address pair The terminal answered obtains probe response packet, and probe response packet is sent to detection service device.
In one specific embodiment of the present embodiment, second server 102 to the IP address in all DDOS attack sources according to Secondary progress PING detection, to obtain probe response packet.PING is a common communication protocol, belongs to ICP/IP protocol (Transmission Control Protocol/Internet Protocol, transmission control protocol/Internet Protocol) A part, be typically used for detection network it is logical with it is obstructed, PING passes through one ICMP(Internet Control of transmission Messages Protocol, internet letter report control protocol) echo request message is to destination, and whether report receives and wish The ICMP echo(ICMP Echo Reply of prestige).It can effectively simply be obtained from attack source IP using PING detection The probe response packet of location, to improve the efficiency of DDOS attack identifing source.
In other specific embodiments of the present embodiment, Telnet, Traceroute etc. is can also be used in second server 102 Other common interconnection network agreements successively detect the IP address in all DDOS attack sources.
Step 46, detection service device extracts the detection source IP address in probe response packet and detects the ttl value of source IP address, Judge whether the difference for the ttl value attacked the ttl value of source IP address and detect source IP address is greater than preset value, if so, determining Attack source IP address is the IP address forged, if not, it is determined that attack source IP address is true IP address.
Specifically, detection service device 103 carries out DPI to all probe response packets that second server 102 returns first Analysis extracts the attack source IP address in all probe response packets and its TTL distribution.Then one by one by multiple attack source IP The ttl value of address is compared with the ttl value of its corresponding detection source IP address, judges multiple attack source IP address respectively Ttl value and the difference of ttl value of its corresponding detection source IP address whether be greater than preset value.Characteristic based on ttl value, When attack source IP address ttl value it is corresponding detection source IP address ttl value difference be greater than preset value (such as: when 5), Illustrate that the error of the ttl value of the corresponding detection source IP address of the ttl value for attacking source IP address is larger, then can determine attack source IP address is the IP address forged.When the difference of the ttl value of the corresponding detection source IP address of the ttl value of attack source IP address When less than or equal to preset value, then it can determine that attack source IP address is true IP address.
Network layer DDOS attack source discrimination provided in an embodiment of the present invention is monitoring first by detection service device When server is by DDOS attack, using the second server being in first server in same network topology to DDOS attack Source is reversely detected, while using the characteristic of ttl value, ttl value and detection by comparing the source IP address in DDOS attack source The ttl value of source IP address can rapidly and efficiently identify the true and false of network layer DDOS attack source IP address.
Fourth embodiment
Fig. 5 is the structural schematic diagram for the detection service device that fourth embodiment of the invention provides.Detection provided in this embodiment Server can be used to implement the network layer DDOS attack source discrimination in first embodiment.As shown in figure 5, detection service device 50 include: DDOS attack packet obtain with analysis module 51, probe instructions sending module 52, probe response packet analysis module 53, sentence Disconnected module 54.
Wherein, DDOS attack packet, which is obtained, is used for analysis module 51 when monitoring first server by DDOS attack, DDOS attack packet is obtained from the first server, extracts the attack source IP address in the DDOS attack packet and the attack source The ttl value of IP address.
Probe instructions sending module 52 is used to send to second server and obtains comprising the DDOS attack packet and analyze mould The probe instructions for the attack source IP address that the analysis of block 51 obtains, the second server are in together with the first server In one network topology, the probe instructions are used to indicate the second server and detect to the attack source IP address.
Probe response packet analysis module 53 is sent out for receiving the second server according to the probe instructions sending module The probe response packet that the probe instructions sent return extracts the detection source IP address in the probe response packet and the detection The ttl value of source IP address.
Judgment module 54 is used to judge that the DDOS attack packet to obtain the attack source obtained with the analysis of analysis module 51 The difference of the ttl value for the detection source IP address that the ttl value of IP address and the probe response packet analysis module 52 analysis obtain Whether value is greater than preset value, if so, determining that the attack source IP address is the IP address forged, if not, it is determined that described to attack Hitting source IP address is true IP address.
The detailed process of the respective function of each Implement of Function Module of the present embodiment detection service device 50, refers to above-mentioned Fig. 1 To particular content described in embodiment illustrated in fig. 4, details are not described herein again.
Network layer DDOS attack identifing source device provided in an embodiment of the present invention, by monitor first server by When DDOS attack, DDOS attack source is carried out using the second server being in first server in same network topology reversed Detection, while using the characteristic of ttl value, by comparing the ttl value and detection source IP address of the source IP address in DDOS attack source Ttl value can rapidly and efficiently identify the true and false of network layer DDOS attack source IP address.
5th embodiment
Fig. 6 is the structural schematic diagram for the detection service device that fifth embodiment of the invention provides.Detection provided in this embodiment Server can be used to implement the network layer DDOS attack source discrimination in second embodiment and 3rd embodiment.Such as Fig. 6 institute Show, detection service device 60 includes: that DDOS attack packet obtains and analysis module 61, probe instructions sending module 62, probe response packet Analysis module 63, judgment module 64.
Wherein, DDOS attack packet, which is obtained, is used for analysis module 61 when monitoring first server by DDOS attack, DDOS attack packet is obtained from the first server, extracts the attack source IP address in the DDOS attack packet and the attack source The ttl value of IP address.It includes: DDOS attack packet acquisition request transmission unit that the DDOS attack packet, which is obtained with analysis module 61, 611, DDOS attack packet receiving unit 612, DDOS attack packet analysis unit 613.Wherein DDOS attack packet acquisition request sends single Member 611 is for when monitoring first server by DDOS attack, Xiang Suoshu first server to send all DOOS of acquisition and attacks Hit the request of packet;DDOS attack packet receiving unit 612 is obtained for receiving the first server according to the DDOS attack packet All DDOS attack packets that the request for all DOOS attack packages of the acquisition that request transmitting unit 611 is sent is sent.DDOS is attacked It hits packet analysis unit 613 and carries out DPI for all DDOS attack packets received to the DDOS attack packet receiving unit 612 Analysis obtains the ttl value of the attack source IP address and the attack source IP address in all DDOS attack packets respectively.
Probe instructions sending module 62 is used to send to second server and obtains comprising the DDOS attack packet and analyze mould The probe instructions for the attack source IP address that the analysis of block 61 obtains, the second server are in together with the first server In one network topology, the probe instructions are used to indicate the second server and detect to the attack source IP address, It is also used to send the probe instructions comprising all attack source IP address to second server, the probe instructions are used to indicate The second server successively detects the attack source IP address in all DDOS attack packets using PING order.
Probe response packet analysis module 63 is for receiving the second server according to the probe instructions sending module 62 The probe response packet that the probe instructions sent return extracts the detection source IP address in the probe response packet and the spy Survey the ttl value of source IP address.The probe response packet analysis module includes: probe response packet receiving unit 631, probe response packet Analytical unit 632.Wherein, probe response packet receiving unit 631 is for receiving the second server according to the probe instructions Sending module send probe instructions return all probe response packets, the probe response packet by the second server according to The probe instructions, it is corresponding from the attack source IP address when being detected using PING order to the attack source IP address Terminal obtain.Probe response packet analysis unit 632 is for received to the probe response packet receiving unit 631 described all Probe response packet carries out DPI analysis, extracts the attack source IP address in all probe response packets and the attack source respectively The ttl value of IP address.
Judgment module 64 is used to judge that the DDOS attack packet to obtain the attack source obtained with the analysis of analysis module 62 The difference of the ttl value for the detection source IP address that the ttl value of IP address and the probe response packet analysis module 63 analysis obtain Whether value is greater than preset value, if so, determining that the attack source IP address is the IP address forged, if not, it is determined that described to attack Hitting source IP address is true IP address.
The detailed process of the respective function of each Implement of Function Module of the present embodiment detection service device 60, refers to above-mentioned Fig. 1 To particular content described in embodiment illustrated in fig. 4, details are not described herein again.
Network layer DDOS attack identifing source device provided in an embodiment of the present invention, by monitor first server by When DDOS attack, DDOS attack source is carried out using the second server being in first server in same network topology reversed Detection, while using the characteristic of ttl value, by comparing the ttl value and detection source IP address of the source IP address in DDOS attack source Ttl value can rapidly and efficiently identify the true and false of network layer DDOS attack source IP address.
Sixth embodiment
Referring to Fig. 7, showing the structure of the network layer DDOS attack identifing source system of sixth embodiment of the invention offer Schematic diagram.As shown in fig. 7, network layer DDOS attack identifing source system 70 provided in this embodiment includes: first server 71, inspection Survey server 72 and second server 73.
Wherein, the request for the acquisition DOOS attack package that first server 71 is used to be sent according to detection service device 72, will DDOS attack packet is sent to detection service device 72.
The specific structure of detection service device 72 can refer to the device of Fig. 5 Yu Fig. 6 corresponding embodiment, and details are not described herein again.
Second server 73 is used for the probe instructions sent according to detection service device 72, visits to attack source IP address It surveys, obtains probe response packet from the corresponding terminal of attack source IP address, and probe response packet is sent to detection service device 72.Its In, second server 73 and first server 71 are in together in a network topology.
Each device realizes that the detailed process of function please refers in network layer DDOS attack identifing source system in the present embodiment The method and Fig. 5 of Fig. 1 to Fig. 4 corresponding embodiment and the device of Fig. 6 corresponding embodiment, details are not described herein again.
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weight Point explanation is the difference from other embodiments, and the same or similar parts between the embodiments can be referred to each other. For device class embodiment, since it is basically similar to the method embodiment, so being described relatively simple, related place ginseng See the part explanation of embodiment of the method.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that process, method, article or device including a series of elements are not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or device Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or device including the element.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The above described is only a preferred embodiment of the present invention, be not intended to limit the present invention in any form, though So the present invention has been disclosed as a preferred embodiment, and however, it is not intended to limit the invention, any technology people for being familiar with this profession Member, without departing from the scope of the present invention, when the technology contents using the disclosure above are modified or are modified It is right according to the technical essence of the invention for the equivalent embodiment of equivalent variations, but without departing from the technical solutions of the present invention Any simple modification, equivalent change and modification made by above embodiments, all of which are still within the scope of the technical scheme of the invention.

Claims (8)

1. a kind of network layer DDOS attack source discrimination characterized by comprising
Detection service device obtains DDOS attack when monitoring first server by DDOS attack, from the first server Packet extracts the ttl value of the attack source IP address and the attack source IP address in the DDOS attack packet;
The probe instructions comprising the attack source IP address are sent to second server, the second server is by the detection Server selection is in any one server in a network topology, the probe instructions together with the first server It is used to indicate the second server and successively the attack source IP address in all DDOS attack packets is visited using PING order It surveys;
The probe response packet that the second server is returned according to the probe instructions is received, is extracted in the probe response packet The ttl value of source IP address and the detection source IP address is detected, the probe response packet is as the second server according to Probe instructions, when being detected using PING order to the attack source IP address, from the attack source IP address corresponding end End obtains;The detection source IP address is consistent with the attack source IP address, and the ttl value of the detection source IP address is described attacks Hit the true ttl value of source IP;And
Judge whether the ttl value of the attack source IP address and the difference of the ttl value of the detection source IP address are greater than preset value, If so, determining that the attack source IP address is the IP address forged, if not, it is determined that the attack source IP address is true IP address.
2. the method according to claim 1, wherein the detection service device monitor first server by When DDOS attack, DDOS attack packet is obtained from the first server, extracts the attack source IP address in the DDOS attack packet The step of with the ttl value for attacking source IP address, comprising:
When monitoring first server by DDOS attack, Xiang Suoshu first server sends to obtain to be owned detection service device The request of DOOS attack package;
Receive all DDOS attack packets that the first server is returned according to the request;
DPI analysis is carried out to all DDOS attack packets;
The ttl value of the attack source IP address and the attack source IP address in all DDOS attack packets is obtained respectively.
3. according to the method described in claim 2, it is characterized in that, the reception second server refers to according to the detection The probe response packet returned is enabled, the TTL of the detection source IP address and the detection source IP address in the probe response packet is extracted The step of value, comprising:
Receive all probe response packets that the second server is returned according to the probe instructions;
DPI analysis is carried out to all probe response packets;
The ttl value of the attack source IP address and the attack source IP address in all probe response packets is extracted respectively.
4. a kind of network layer DDOS attack source discrimination characterized by comprising
Detection service device obtains DDOS attack when monitoring first server by DDOS attack, from the first server Packet extracts the ttl value of the attack source IP address and the attack source IP address in the DDOS attack packet;
The detection service device sends the probe instructions comprising the attack source IP address, the second service to second server Device is any one service being in together in a network topology with the first server by detection service device selection Device, the probe instructions are used to indicate the second server using PING order successively to the attack in all DDOS attack packets Source IP address is detected;
The second server detects the attack source IP address according to the probe instructions, from the attack source IP The corresponding terminal in address obtains probe response packet, and the probe response packet is sent to the detection service device, the detection Response bag, according to the probe instructions, detects the attack source IP address using PING order by the second server When, it is obtained from the corresponding terminal of the attack source IP address;The detection source IP address is consistent with the attack source IP address, institute The ttl value for stating detection source IP address is the true ttl value of the attack source IP;And
The detection service device extracts the TTL of detection source IP address and the detection source IP address in the probe response packet Value, judges whether the ttl value of the attack source IP address and the difference of the ttl value of the detection source IP address are greater than preset value, If so, determining that the attack source IP address is the IP address forged, if not, it is determined that the attack source IP address is true IP address.
5. a kind of network layer DDOS attack identifing source device is applied to detection service device characterized by comprising
DDOS attack packet obtains and analysis module, for when monitoring first server by DDOS attack, from described first Server obtains DDOS attack packet, extracts attack source IP address and the attack source IP address in the DDOS attack packet Ttl value;
Probe instructions sending module is analyzed for sending to obtain comprising the DDOS attack packet to second server with analysis module Obtain the attack source IP address probe instructions, the second server be by the detection service device selection with it is described First server is in any one server in a network topology together, and the probe instructions are used to indicate second clothes Business device successively detects the attack source IP address in all DDOS attack packets using PING order;
Probe response packet analysis module, the institute sent for receiving the second server according to the probe instructions sending module The probe response packet for stating probe instructions return, with extracting detection source IP address and the detection source IP in the probe response packet The ttl value of location, the probe response packet, according to the probe instructions, are attacked using PING order to described by the second server When hitting source IP address and being detected, obtained from the corresponding terminal of the attack source IP address;The detection source IP address with it is described Attack source IP address is consistent, and the ttl value of the detection source IP address is the true ttl value of the attack source IP;
Judgment module, for judging that the DDOS attack packet obtains the attack source IP address obtained with analysis module analysis Whether the difference of the ttl value for the detection source IP address that ttl value is obtained with probe response packet analysis module analysis is greater than Preset value, if so, determining that the attack source IP address is the IP address forged, if not, it is determined that the attack source IP address For true IP address.
6. device according to claim 5, the DDOS attack packet, which is obtained with analysis module, includes:
DDOS attack packet acquisition request transmission unit, for when monitoring first server by DDOS attack, Xiang Suoshu One server sends the request for obtaining all DOOS attack packages;
DDOS attack packet receiving unit sends list according to the DDOS attack packet acquisition request for receiving the first server All DDOS attack packets that the request for all DOOS attack packages of the acquisition that member is sent is sent;
DDOS attack packet analysis unit, for all DDOS attack packets received to the DDOS attack packet receiving unit into Row DPI analysis obtains the TTL of the attack source IP address and the attack source IP address in all DDOS attack packets respectively Value.
7. device according to claim 6, which is characterized in that the probe response packet analysis module includes:
Probe response packet receiving unit, the spy sent for receiving the second server according to the probe instructions sending module Survey all probe response packets that instruction returns;
Probe response packet analysis unit, for all probe response packets received to the probe response packet receiving unit into The TTL of the attack source IP address and the attack source IP address in all probe response packets is extracted in row DPI analysis respectively Value.
8. a kind of network layer DDOS attack identifing source system characterized by comprising such as any one of claim 5 to 7 institute Detection service device, first server and the second server stated;
The request for the acquisition DOOS attack package that the first server is used to be sent according to the detection service device, by DDOS attack Packet is sent to the detection service device;
The second server is used for the probe instructions sent according to the detection service device, to the attack source IP address It is detected, obtains probe response packet from the corresponding terminal of the attack source IP address, and the probe response packet is sent to The detection service device;
Wherein, the second server and the first server are in together in a network topology.
CN201310325923.XA 2013-07-30 Network layer DDOS attack source discrimination, apparatus and system Active CN104348794B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310325923.XA CN104348794B (en) 2013-07-30 Network layer DDOS attack source discrimination, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310325923.XA CN104348794B (en) 2013-07-30 Network layer DDOS attack source discrimination, apparatus and system

Publications (2)

Publication Number Publication Date
CN104348794A CN104348794A (en) 2015-02-11
CN104348794B true CN104348794B (en) 2019-07-16

Family

ID=

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1954545A (en) * 2003-03-03 2007-04-25 思科技术公司 Using TCP to authenticate IP source addresses
CN101383812A (en) * 2007-09-03 2009-03-11 电子科技大学 IP spoofing DDoS attack defense method based on active IP record
CN101582833A (en) * 2008-05-15 2009-11-18 成都市华为赛门铁克科技有限公司 Method and device for processing spoofed IP data packet

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1954545A (en) * 2003-03-03 2007-04-25 思科技术公司 Using TCP to authenticate IP source addresses
CN101383812A (en) * 2007-09-03 2009-03-11 电子科技大学 IP spoofing DDoS attack defense method based on active IP record
CN101582833A (en) * 2008-05-15 2009-11-18 成都市华为赛门铁克科技有限公司 Method and device for processing spoofed IP data packet

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"Hop-count filtering:an effective defense against spoofed DDoS traffic";Cheng Jin,et al;《CCS "03 Proceedings of the 10th ACM conference on Computer and communications security》;20031030;第1-2部分,图1

Similar Documents

Publication Publication Date Title
KR102088299B1 (en) Apparatus and method for detecting drdos
CN1316369C (en) Secret hashing for SYN/FIN correspondence
Jin et al. Hop-count filtering: an effective defense against spoofed DDoS traffic
CN102487339B (en) Attack preventing method for network equipment and device
KR101280910B1 (en) Two-stage intrusion detection system for high speed packet process using network processor and method thereof
US7301899B2 (en) Prevention of bandwidth congestion in a denial of service or other internet-based attack
Chapade et al. Securing cloud servers against flooding based DDoS attacks
US20120159623A1 (en) Method and apparatus for monitoring and processing dns query traffic
KR20130017333A (en) Attack decision system of slow distributed denial of service based application layer and method of the same
JP6435695B2 (en) Controller and its attacker detection method
CN106357685A (en) Method and device for defending distributed denial of service attack
CN102984178B (en) The detection method of data message and device
CN105812318B (en) For preventing method, controller and the system of attack in a network
CN110166480A (en) A kind of analysis method and device of data packet
CN102130920A (en) Botnet discovery method and system thereof
CN106534068A (en) Method and device for cleaning forged source IP in DDOS (Distributed Denial of Service) defense system
Robinson et al. Evaluation of mitigation methods for distributed denial of service attacks
CN106357660A (en) Method and device for detecting IP (internet protocol) of spoofing source in DDOS (distributed denial of service) defense system
JP2004356915A (en) System and apparatus for information processing, program, and method for detecting abnormality of communication through communication network
CN101888296A (en) Method, device, equipment and system for detecting shadow user
KR20200109875A (en) Harmful ip determining method
Bala et al. Quality based Bottom-up-Detection and Prevention Techniques for DDOS in MANET
CN104348794B (en) Network layer DDOS attack source discrimination, apparatus and system
Maheshwari et al. Mitigation of ddos attacks using probability based distributed hop count filtering and round trip time
CN107018116A (en) Method, device and the server of monitoring traffic in network

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant