期刊文献+

分布式DoS攻击及其反向追踪系统的实现 被引量:1

DDoS AND THE REALIZATION OF ITS IP TRACEBACK
下载PDF
导出
摘要 本文首先简要描述了分布式拒绝服务的原理和体系结构 ,接着重点探索了改进的反向路由追踪边采样算法。最后详细给出了在该算法下的反向路由追踪系统的实现过程。 This article describes the principle and system framework of DDoS.It is focused on the compressed edge fragment sampling algorithm.At last,the article presents the process of realizing IP traceback in term of the algorithm.
作者 田涛 鲁士文
出处 《计算机应用与软件》 CSCD 北大核心 2005年第2期102-104,共3页 Computer Applications and Software
关键词 互联网 网络带宽 分布式拒绝服务攻击 DOS 反向追踪系统 网络安全 防火墙 DDoS Compressed edge fragment sampling algorithm IP traceback
  • 相关文献

参考文献5

  • 1Stefan Savage, David Wetherall, Anna Karlin, Ton Allderson, Practical Network Support for IP Traceback [C],in proceedings of 2000 ACM SIGCOMM Conferen e,Aug. 2000.
  • 2P Ferguson, D Senie, RFC22.67: Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing. 1998.
  • 3Dawn X. song and Adrian Perring. Advanced and Authenticated Marking schemes for IP Traceback [DB/OL].
  • 4S Deering, RFC 2460: Internet Protocol, version 6( ipv6 ), DEC. 1998.
  • 5Sevn Dietrich, Nell Long, and Daivd Dittrich, "Analyzing distributed denial of service attack tools:The shaft case[ C]. in 14th systems Administration Conference LISA 2000,2000.

同被引文献9

  • 1李德全,徐一丁,苏璞睿,冯登国.IP追踪中的自适应包标记[J].电子学报,2004,32(8):1334-1337. 被引量:33
  • 2李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 3Stone R. CenterTrack:an IP overlay network for tracking DoS floods [C]// Proc. 9 Usenix Security Symp, USenix Assoc, 2000:199-212.
  • 4Dean D, Franklin M, Stubblefield A. An algebraic approach to IP traceback[ C]// Information and System Security, 2001.
  • 5Bellovin S M. ICMP Traceback Messages, Intemet Draft [S]. March, 2001.
  • 6Malone Lee J. Identity based Signcryption[ R]. Cryptology Print Archive, Report 2002/098, IACR, 2002.
  • 7Paterson K G. ID-based signatures from pairings on elliptic curves[ J]. Electronics Letters , 2002,38 ( 18 ) : 1025- 1026.
  • 8TechTarget.分布式拒绝服务攻击(DDos)原理[DB/OL].http://www, yesky, com/searchsmallbizit/508908965506056192/ 23050318/1923615-1. shtml,21305-03-18.
  • 9杜彦辉,马锐,刘玉树.分布式拒绝服务攻击的形式化描述[J].计算机应用研究,2004,21(3):214-216. 被引量:3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部