期刊文献+

Formalized Description of Distributed Denial of Service Attack 被引量:1

Formalized Description of Distributed Denial of Service Attack
下载PDF
导出
摘要 The distributed denial of service (DDoS) attack is one of the dangers in intrusion modes. It's difficult to defense and can cause serious damage to the system. Based on a careful study of the attack principles and characteristics, an object-oriented formalized description is presented, which contains a three-level framework and offers full specifications of all kinds of DDoS modes and their features and the relations between one another. Its greatest merit lies in that it contributes to analyzing, checking and judging DDoS. Now this formalized description has been used in a special IDS and it works very effectively.( The distributed denial of service (DDoS) attack is one of the dangers in intrusion modes. It's difficult to defense and can cause serious damage to the system. Based on a careful study of the attack principles and characteristics, an object-oriented formalized description is presented, which contains a three-level framework and offers full specifications of all kinds of DDoS modes and their features and the relations between one another. Its greatest merit lies in that it contributes to analyzing, checking and judging DDoS. Now this formalized description has been used in a special IDS and it works very effectively.(
出处 《Journal of Beijing Institute of Technology》 EI CAS 2004年第4期360-364,共5页 北京理工大学学报(英文版)
基金 SponsoredbytheMinisterialLevelResearchFoundation(91812 0 1)
关键词 distributed) denial of service(DDoS) attack formalized description framework knowledge (expression) distributed) denial of service(DDoS) attack formalized description framework knowledge (expression)
  • 相关文献

参考文献2

二级参考文献18

  • 1[1]UML version 1.3. http://www.omg.org.
  • 2[2]Booch, G., Rumbaugh, J., Jacobson, I. The Unified Modeling Language User Guide. Boston: Addison-Wesley, 1999.
  • 3[3]Jézéquel, J.M., Le Guennec, A., Pennaneach, F. Validating distributed software modeled with UML. In: Bézivin, J., Muller, P.A.,eds. Proceedings of the lst International Workshop on the Unified Modeling Language, UML'98-Beyond the Notation. Vol. 1618 of LNCS, Springer-Verlag, 1998.331~340. http://www.essaim. univ-mulhouse.fr/uml/evenements/.
  • 4[4]Evans, A., France, R., Lano, K., et al. Developing the UML as a formal modelling notation. In: Bézivin, J., Muller, P.A., eds.Proceedings of the lst International Workshop on the Unified Modeling Language, UML'98-Beyond the Notation. Vol. 1618 of LNCS, Springer-Verlag, 1998. 293~307. http://www.essaim. univ-mulhouse.fr/uml/evenements/.
  • 5[5]Offutt, J., Abdurazik, A. Generating tests from UML specifications. In: France, R., Rumpe, B., eds. Proceedings of the 2nd International Conference on UML'99, the United Modeling Language, Beyond the Standard. Vol. 1723 of LNCS, Springer-Verlag,1999. http://www.cs.colostate.edu/UML99/.
  • 6[6]Arafjo, J. Formalizing sequence diagrams. In: Andrade, L., Moreira, A., Deshpande, A., eds. Proceedings of the OOPSLA'98 Workshop on Formalizing UML. Why? How? 1998. http://www.acm.org/sigplan/oopsla/oopsla98/.
  • 7[7]Geisler, R. Precise UML semantics through formal metamodeling. In: Andrade, L., Moreira, A., Deshpande, A., eds. Proceedings of the OOPSLA'98 Workshop on Formalizing UML. Why? How? 1998. http://www.acm.org/sigplan/oopsla/oopsla98/.
  • 8[8]Kim, S.K., Carrington, D. Formalizing the UML class diagram using object_z. In: Rumpe, B., France, R.B., eds. Proceedings of the 2nd International Conference on the Unified Modeling Language. Vol. 1723 of LNCS. 1999. http://www.cs.colostate.edu/UML99/.
  • 9[9]von der Beeck, M. A concise compositional statecharts semantics definition. In: Proceedings of the FORTE/PSTV 2000. Kluwer,2000. http://forte-pstv-2000.cpr, it/
  • 10[10]Uselton, A., Smolka, S. A process-algebraic semantics for statecharts via state refinement. In: Olderog, E-R., ed. Proceedings of the IFIP TC2/WG2.1/WG2.2/WG2.3 working Conference on Programming Concepts, Methods and Calculi (PROCOMET'94), North Holland/Elsevier, 1994.

共引文献89

同被引文献10

  • 1肖颖,云晓春,辛毅.基于搜索引擎蠕虫的分析与检测[J].计算机工程与应用,2006,42(7):112-115. 被引量:6
  • 2HINDEN R, DEERING S. IP version 6 addressing architecture [ J/ OL]. lntemet Engineering Task Force, 2006:192 - 194 [2009 -03 - 15]. http://www, left. nrg/rfc/rfc2373, txt.
  • 3KIENZLE D M, ELDER M C. Recent worms: A survey and trends [C]// WORM 2003: Proceedings of the 2003 ACM Workshop on Rapid Maleode. New York: ACM Press, 2003:1 - 10.
  • 4HOAGLAND J. The teredo protocol: Tunneling past network security and other security implications[ EB/OL]. [ 2009 - 03 - 06]. http://www, symantec, com/aveenter/reference/Teredo _ pdf.
  • 5Microsoft. Teredo overview [ EB/OL]. (2006 - 06 - 23) [ 2009 - 03 - 18]. http://www, microsoft, com/technet/prodtechnol/winxp- pro/maintain/Teredo, mspx.
  • 6CHEN Z, GAO L, KWIAT K. Modeling the spread of active worms [C]//INFOCOM 2003: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. Washington, DC: IEEE Press, 2003, 3:1890 - 1900.
  • 7STREFTARIS G, GIBSON G J. Statistical inference for stochastic epidemic models [ C/OL]// Proceedings of the 17th International Workshop on Statistical Modelling. 2002:609 -616 [2009 -03 - 22]. http://www.ma. hw. ae. uk/- georges/researeh/SG _ iwsm02, pdf.
  • 8ZOU C C, GONG W, TOWSLEY D, et al. The monitoring and early detection of Internet worms [ J]. IEEE/ACM Transactions on Networking, 2005, 13(5): 961-974.
  • 9RIUSKSK.Web蠕虫编写艺术[EB/OL].[2009-05-03].http//riusksk.blogbus.com/logs/37533682.html.
  • 10邢长友,杨莉,陈鸣.网络蠕虫传播建模分析[J].电子科技大学学报,2007,36(3):590-593. 被引量:14

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部