期刊文献+

基于生存性的应对拒绝服务攻击的策略 被引量:2

Managing denial of service attacks based on survivability
下载PDF
导出
摘要 拒绝服务攻击是大量消耗网络或系统有用资源使用户不能得到正常服务的恶意行为,是一个威胁网络安全的重大问题。生存性是指一个系统在受到攻击、出现错误或发生紧急事件时完成其任务的能力。从生存性角度来设计网络系统可使网络系统在受到攻击时,能积极地应对攻击,尽可能长时间地提供关键服务。 Denial of service (DoS) attacks have been launched against Internet sites for years, which is a significant problem because it can shut an organization off from the Internet. Survivability refers to the capability of a system to complete its mission in a timely manner, even if significant portions are compromised by attack or accident. Designing network system from the sur-vivability could manage the DoS attacks positively, and provide essential services as long as possible in the presence of attacks and failures.
出处 《计算机工程与设计》 CSCD 2004年第4期593-595,共3页 Computer Engineering and Design
关键词 生存性 拒绝服务攻击 应对策略 网络安全 survivability denial of service managing strategy
  • 相关文献

参考文献4

  • 1Allen Householder'Linda Pesante.Managing the threat of denial-of-service attacks [R].Pittsburgh:Carnegie Mellon University'2001.
  • 2Bruce Schneier.Distributed denial of service attacks [R].CERT/CC'USA'2000.
  • 3Howard F Lipson'David A Fisher.Survivability-A new technical and business perspective on security [R].CERT/CC'USA'2001.1-23.
  • 4Linger R C'Mead N R'Lipson H F.Requirements definition for survivable network systems [R].Pittsburgh:Software Engineering Institute Carnegie Mellon University'2000.10-32.

同被引文献19

  • 1杨余旺,杨静宇,孙亚民.分布式拒绝服务攻击的实现机理及其防御研究[J].计算机工程与设计,2004,25(5):657-660. 被引量:15
  • 2张基温,王玉斐.基于应用环境的入侵检测系统测试方案[J].计算机工程与设计,2006,27(7):1220-1223. 被引量:6
  • 3张海波,孙玉海,任强.入侵容忍数据库的选举算法和同步方案设计[J].计算机工程与设计,2006,27(8):1431-1434. 被引量:5
  • 4荆继武.在攻击中生存[EB/OL].http://www2.ccw.com.cn/04/0411/e/0411e18_1.asp,2005.
  • 5John Howard.An analysis of security incidents on the intemet[D].Carnegie Mellon University,1998.
  • 6Savage S,Wetherall D,Karlin A,et al.Practical network support for IP traceback[J].ACM SIGCOMM Computer Communication Review,2000,30(4):295-306.
  • 7Burch H,Cheswick B.Internet watch:Mapping the internet[J].Computer,1999,32(4):97-98.
  • 8Bill Cheswick,Hal Burch.The internet mapping project[EB/OL].2002.http://research.lumeta.com/ches/map/.
  • 9Caida.Skitter[EB/OL].http://www.caida.org/tools/measurement/skitter/.
  • 10Abraham Yaar,Adrian Perrig,Dawn Song.Pi:A path identification mechanism to defend against DDoS attacks[C].Proceedings of the 2003 IEEE Symposium on Security and Privacy,IEEE Computer Society,2003.93-107.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部