期刊文献+

基于UDP的DDoS攻击实验 被引量:1

Experiment of DDoS Attack Based on UDP
下载PDF
导出
摘要 随着计算机技术的发展,计算机用户越来越多,随之而来的安全问题也越来越重要;现今黑客对网络中的计算机的攻击方法多种多样。近几年,一种名为 DDOS 的攻击手段尤为突出。为了充分了解这种攻击手段的特性,本文将描述以此为目的的模拟攻击实验。本文的架构大概如下。本文先简要介绍分布式拒绝服务攻击的基本原理等,并简单阐述有关工具的原理与使用。其次,本文将详细描述本实验的主要内容,以及当中所用到的工具的使用技巧,还有一些数据的简单分析。 As the computer technology develops,more and more internet users appear.As a result of this, safety becomes more and more important.At present,there are many ways in which hackers attack the computers in internet.And one method named DDoS is especially outstanding.In order to know more about this method,the context will describe the simulated experiment based on it.The text will explain the basic principle of Distributed Denial of Service first,and show the principle and use of some DDoS tools.Secondly, the text will describe the content of the experiment and some techniques of the tools.At last,there will be some analysis of data.
作者 王颖熙
出处 《中山大学研究生学刊(自然科学与医学版)》 2004年第4期100-112,共13页 Journal of the Graduates Sun YAT-SEN University(Natural Sciences.Medicine)
  • 相关文献

参考文献4

  • 1Steven M.Bellovin.Distributed Denial of Service Attacks[]..
  • 2Dave Dittrich University of Washington.Dissecting Distributed Malware Networks[]..
  • 3DeokJo Jeon.Understanding DDoS Attack,Tools and Free Anti-tools with Recommendation[]..
  • 4Budi Rahardjo.Overview of Network Security[]..

同被引文献14

  • 1顾群业,李广福.拒绝服务攻击方式分析及防御策略部署[J].网络安全技术与应用,2005(7):43-45. 被引量:2
  • 2林梅琴,李志蜀,袁小铃,周密,王雪松,童铭.分布式拒绝服务攻击及防范研究[J].计算机应用研究,2006,23(8):136-138. 被引量:11
  • 3李长隆.DDoS攻击的原理及防范DDoS攻击的策略[J].电脑与电信,2007(8):39-40. 被引量:3
  • 4张卫东 李晖 尹钰.网络安全实验教学方法的研究.实验室研究与探索,2007,(12):286-289.
  • 5GASTI P, TSUDIK G, UZUN E, et al. DoS and DDoS in named data networking [ J ]. International Conference on Computer Communications and Networks, 2013, 44 (3) : 1-7.
  • 6ZARGAR S T, JOSHI J, TIPPER D. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks[J]. Communications Surveys & Tutorials, 2013, 15(4) : 2046-2069.
  • 7PENG T, LECKIE C, Ramamohanarao K. Survey of net- work -based defense mechanisms countering the DoS and DDoS problems [J] . ACM Computing Surveys, 2007, 39(1): 3.
  • 8JEON D. Understanding DDoS attack, tools and free anti - tools with recommendation [ EB/OL ]. [ 2014 - 08 - 25 ] . http: //www. sans. org/infoseFAQ/threats/Under- stamding ddos. htm.
  • 9ISOZAKI H, ATA S, OKA I, et al. Performance im- provement on probabilistic packet marking by using history caching [ C ] //APSITr' OS Information and Telecommu- nication Technologies, 2005.6th Asia - Pacific Sympo sium, Piscafauany, N. J: IEEE Press, 2005:381-386.
  • 10DOULIGERIS C, MITROKOTSA A. DDoS attacks and defense mechanisms: classification and state of the art [J]. Computer Networks, 2004, 44(5): 643-666.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部