Skip navigation

DSpace JSPUI

DSpace preserves and enables easy and open access to all types of digital content including text, images, moving images, mpegs and data sets

Learn More
DSpace logo
English
中文
  • Browse
    • Communities
      & Collections
    • Publication Year
    • Author
    • Title
    • Subject
  • Search TDR
  • Rights Q&A
    • My Page
    • Receive email
      updates
    • Edit Profile
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 電機工程學系
Please use this identifier to cite or link to this item: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/83096
Title: 基於P4的內容感知方法來緩解慢速超文本傳輸協定POST攻擊
A P4-Based Content-Aware Approach to Mitigate Slow HTTP POST Attacks
Other Titles: A P4-Based Content-Aware Approach to Mitigate Slow HTTP POST Attacks
Authors: 謝至宥
Chih-Yu Hsieh
Advisor: 林宗男
Tsung-Nan Lin
Keyword: 超文本傳輸協定,分散式阻斷服務,軟體定義網路,P4 程式語言,
HTTP,distributed denial of service (DDoS),software-defined networking (SDN),P4,
Publication Year : 2022
Degree: 碩士
Abstract: 慢速超文本傳輸協定 POST 攻擊是一種針對網頁伺服器的應用層分散式阻斷服務攻擊。攻擊者偽裝成網路速度緩慢的使用者,從而長時間佔據伺服器資源並使其他人無法存取網頁服務。因為攻擊者發送的封包都有遵守超文本傳輸協定,從網路活動的方面難以觀察出差異。為了要解決這個問題,我們在本文中提出一種敏捷的防禦方式,透過利用軟體定義網路中可程式化的網路裝置來解析應用層標頭並辨別攻擊者。藉著這些不存在於傳統網路裝置中的資訊,我們可以辨別出不同類型的超文本傳輸協定請求並限制各個類型的連線數量。這種利用軟體定義網路中可程式化資料層的作法,使它可以達成分散式、來源端的防禦,整體而言具有良好的擴展性。實驗的模擬結果顯示,它對防禦慢速超文本傳輸協定 POST 攻擊是有效且準確的。
A slow HTTP POST attack is an application-layer distributed denial of service (DDoS) attack targeting web servers. The attacker simulates a legitimate user with a slow network speed and continues to send requests, resulting in server resources being occupied for a long time and being unavailable to other users. Since the network requests from the attacker comply with HTTP, they show no difference in network activities. The similarity to legitimate behavior makes it challenging to identify such attack traffic. To address this issue, this paper proposes a responsive defense mechanism that exploits programmable network devices in software-defined networking (SDN) to identify attack traffic based on application-layer headers. With information that is not available from legacy network devices, this method can identify different types of HTTP requests and limit the number of connections for each type per source. This approach achieves a distributed, source-based DDoS defense capability by utilizing data plane programmability in SDN, making it a scalable solution. The simulation results show that the approach is effective and accurate against slow HTTP POST attacks.
URI: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/83096
DOI: 10.6342/NTU202210137
Fulltext Rights: 同意授權(全球公開)
Appears in Collections:電機工程學系

Files in This Item:
File SizeFormat 
U0001-0648221214011a17.pdf4.07 MBAdobe PDFView/Open
Show full item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved