期刊文献+

一种新的基于流量的SYN Flooding攻击源定位防御算法及其Petri网描述

A Novel Algorithm of SYN Flooding Attack Source Orientation & Defense Dased on Network Traffic and its Description Using Petri Network
下载PDF
导出
摘要 随着计算机网络的飞速发展,网络安全已经成为全社会关心的重要问题。本文通过对网络安全及分布式拒绝服务攻击进行研究,提出了一种新的基于流量的SYNFlooding攻击定位及防御算法。该算法所依据的体系结构是一个典型的分布式系统,各Agent分别部署在网络的不同节点上,整个系统的正常运行依赖于各Agent间的相互协调和通信。本文用聚合Petri网作为工具,对这种新的基于流量地SYNFlooding攻击定位及防御算法进行了具体分析和详细描述。 With the development of network, the network security became an impotent societal problem. We study the network security and Distributed Denial of Service and proposed a novel algorithm of SYN Flooding attack source orientation & defense based on network traffic in this paper. This algorithm is talk about the distributed system. In this system, agents are deployed on different nodes of the network. The operations of the system depend upon the collaboration and communicate among the agents. In this paper, we use the Aggregation Petri Network to specify our algorithm.
出处 《微电子学与计算机》 CSCD 北大核心 2005年第1期20-24,共5页 Microelectronics & Computer
关键词 SYN Flooding攻击 攻击源定位 攻击防御 聚合Petri网 SYN llooding attack, Attack source orientation, Attack defense, Aggregation Petri network
  • 相关文献

参考文献12

  • 1罗军舟 沈俊 等.协议工程和Petri网形式技术[J].计算机科学,1999,26(6):20-25.
  • 2杨新宇,郑守淇,曾明,朱利,魏恒义.CAINONET业务流设计系统的通信模型描述[J].小型微型计算机系统,2001,22(4):426-429. 被引量:2
  • 3D Moore, G Voelker, S Savage. Inferring Intemet Denial of Service Activity, Proceedings of USENIX Security Symposium, 2001. August 2001.
  • 4Stefan Savage, David Wetherall, Anna Karlin, Tom Anderson. Practical Network Support for IP Traceback,Department of Computer Science and Engineering, University of Washington, Technical Report UW-CSE-2000-02-01.
  • 5James Brentano, Gihan V Dias, Terranee L Goan, L Todd Hebedein, Che-Lin Ho, Karl N Levitt, Biswanath Mukherjee. DIDS(Distributed Intrusion Detection System) -Motivation, Architecture, and An Early Prototype. Proceedings of the 14th National Computer Security Conference,1991.
  • 6Hyn Tae Jung, Hae Lyon Kim, Yang Min Seo, Ghun Choe,Sang Lyn Min, Chong Sang Kim. Caller Identification System in the Intemet Environment. Proceedings of 4th Usenix Security Symposium, 1993.
  • 7Stuart Staniford-Chen, L Todd Heberlein. Holding Intruders Accountable on the Intemet. Proceedings of the 1995 IEEE Symposium on Security and Privacy. Oakland, CA,May 1995:39-49.
  • 8Y Zhang, V Paxson. Detecting Stepping Stones. Proceedings of 9th USENIX Security Symposium. August 2000.
  • 9K Yoda, H Etoh. Finding a Connection Chain for Tracing Intruders, In F Guppens, Y Deswarte, D Gollamann, and M Waidner, editors. 6th European Symposisum on Research in Computer Security - ESORICS 2000 LNCS -1985,Toulouse, France, Oct 2000.
  • 10Glenn Sager. Security fun with OCxmon and cflowd, Internet 2 Working Group Meeting, Nov.1998, http://www.caidmorg/projects/.

二级参考文献4

  • 1认.Petri网原理[M].北京:电子工业出版社,1998,4..
  • 2罗军舟 沈俊 等.协议工程和Petri网形式技术[J].计算机科学,1999,26(6):20-25.
  • 3罗军舟,计算机科学,1999年,26卷,增刊,20~25页
  • 4袁崇义,Petri网原理,1998年,4页

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部