基本信息来源于合作网站,原文需代理用户跳转至来源网站获取       
摘要:
Cyber attacks are continuing to hamper working of Internet services despite increased use of network secu-rity systems such as firewalls and Intrusion protection systems (IPS). Recent Distributed Denial of Service (DDoS) attacks on Dec 8th, 2010 by Wikileak supporters on Visa and Master Card websites made headlines on prime news channels all over the world. Another famous DDoS attacks on Independence Day weekend, on July 4th, 2009 were launched to debilitate the US and South Korean governments’ websites. These attacks raised questions about the capabilities of the security systems that were used in the network to counteract such attacks. Firewall and IPS security systems are commonly used today as a front line defense mechanism to defend against DDoS attacks. In many deployments, performances of these security devices are seldom evaluated for their effectiveness. Different security devices perform differently in stopping DDoS attacks. In this paper, we intend to drive the point that it is important to evaluate the capability of Firewall or IPS secu-rity devices before they are deployed to protect a network or a server against DDoS attacks. In this paper, we evaluate the effectiveness of a security device called Netscreen 5GT (or NS-5GT) from Juniper Networks under Layer-4 flood attacks at different attack loads. This security device NS-5GT comes with a feature called TCP-SYN proxy protection to protect against TCP-SYN based DDoS attacks, and UDP protection feature to protect against UDP flood attacks. By looking at these security features from the equipments data sheet, one might assume the device to protect the network against such DDoS attacks. In this paper, we con-ducted real experiments to measure the performance of this security device NS-5GT under the TCP SYN and UDP flood attacks and test the performance of these protection features. It was found that the Juniper’s NS-5GT mitigated the effect of DDoS traffic to some extent especially when the attack of lower intensity. However, the device was unable t
推荐文章
SYN Flood攻击的原理、实现与防范
拒绝服务攻击
SYN Flood攻击
TCP/IP
网络安全
基于WS-security的数据安全交换
端到端
WS-Security
SOAP消息
令牌
基于MIKE FLOOD的城区溃坝洪水模拟研究
溃坝洪水
MIKE FLOOD
数值模拟
淹没水深
淹没范围
内容分析
关键词云
关键词热度
相关文献总数  
(/次)
(/年)
文献信息
篇名 Experimental Evaluation of Juniper Network's Netscreen-5GT Security Device against Layer4 Flood Attacks
来源期刊 信息安全(英文) 学科 工学
关键词 Distributed DENIAL of Service (DDoS) TCP-SYN FLOOD ATTACK TCP-SYN PROXY Protection FIREWALL Security UDP FLOOD ATTACK
年,卷(期) 2011,(1) 所属期刊栏目
研究方向 页码范围 50-58
页数 9页 分类号 TP39
字数 语种
DOI
五维指标
传播情况
(/次)
(/年)
引文网络
引文网络
二级参考文献  (0)
共引文献  (0)
参考文献  (0)
节点文献
引证文献  (0)
同被引文献  (0)
二级引证文献  (0)
2011(0)
  • 参考文献(0)
  • 二级参考文献(0)
  • 引证文献(0)
  • 二级引证文献(0)
研究主题发展历程
节点文献
Distributed
DENIAL
of
Service
(DDoS)
TCP-SYN
FLOOD
ATTACK
TCP-SYN
PROXY
Protection
FIREWALL
Security
UDP
FLOOD
ATTACK
研究起点
研究来源
研究分支
研究去脉
引文网络交叉学科
相关学者/机构
期刊影响力
信息安全(英文)
季刊
2153-1234
武汉市江夏区汤逊湖北路38号光谷总部空间
出版文献量(篇)
230
总下载数(次)
0
总被引数(次)
0
论文1v1指导