期刊文献+

拒绝服务攻击方式分析及防御策略部署 被引量:2

Defense strategies and attack devices of denial of service
原文传递
导出
摘要 网络安全中,拒绝服务攻击以其门槛低、危害巨大、难以抵御等特点成为黑客越来越常用的攻击手段。本文对各种拒绝服务攻击方式按照使用数据包类型进行了分类、总结、归纳和深入地分析,并阐述了相应的防御策略。 In terms of the security of network,since denial of service has the characteristics of easy entry?¢huge harm and unprotection,it more and more become usual attack device of hacker.this article summarizes and analyzes varies attack devices of denial of service according to the types of packets and then express the protective stratagies respectively.
出处 《网络安全技术与应用》 2005年第7期43-45,共3页 Network Security Technology & Application
关键词 网络安全 黑客攻击 计算机网络 拒绝服务攻击方式 防御策略 防火墙 Denial of Service Distributed Denial of Service Defending Against Hacker Attack Security of Network
  • 相关文献

参考文献1

二级参考文献14

  • 1Tripwire. Tripwire for servers [R/OL]. http:∥www. tripwire.com/products/servers/.
  • 2David Moore, Ram Periakaruppan, Jim Dono-hoe, et al.Where in the world is net-geo.caida.org? [C]. INET 2000Proceedings, 2000.
  • 3CERT Coordination Center. Trends in denial of service attacktechnology[R/OL]. 2001.
  • 4Jelena Mirkovic, Janice Martin, Peter Reiher. A taxonomy of DDoS attacks and DDoS defense mechanisms[R]. Computer Science Department University of California, Los Angeles Technical Report #020018,2001.
  • 5王国伟. 网络安全分布式 DDOS 攻击 [N/OL]. http:∥it.rising.com.cn/.
  • 6Howard J D, Longstaff T A. A common language for computer security incidents [R/OL]. Sandia Report: SAND 98-8667, Sandia National Laboratories, http:∥www. cert.org/research/taxonomy_988667.pdf.
  • 7Axelsson S. Intrusion detection systems: A survey and taxonomy [R/OL]. Technical Report 99-15, Department of Computer Engineering, Chalmers University, 2000.
  • 8Debar H, Dacier M, Wespi A. Towards a taxonomy of intrusion-detection systems[J]. Computer Networks, 1999,31(8):805-822.
  • 9Hafner K, Markoff J. Cyberpunk: Outlaws and hackers on the computer frontier[M]. Simon & Schuster, 1991.21-140.
  • 10Bellovin S, LeechM, TaylorT. ICMPtracebackmessages[R/OL]. 2001. Internet draft, Work in progress. http:∥search.ietf. org/internet-drafts/draft-ietf-itrace-01.txt.

共引文献14

同被引文献16

  • 1王颖熙.基于UDP的DDoS攻击实验[J].中山大学研究生学刊(自然科学与医学版),2004,25(4):100-112. 被引量:1
  • 2孙钦东,张德运,高鹏.基于时间序列分析的分布式拒绝服务攻击检测[J].计算机学报,2005,28(5):767-773. 被引量:55
  • 3林梅琴,李志蜀,袁小铃,周密,王雪松,童铭.分布式拒绝服务攻击及防范研究[J].计算机应用研究,2006,23(8):136-138. 被引量:11
  • 4李长隆.DDoS攻击的原理及防范DDoS攻击的策略[J].电脑与电信,2007(8):39-40. 被引量:3
  • 5张卫东 李晖 尹钰.网络安全实验教学方法的研究.实验室研究与探索,2007,(12):286-289.
  • 6STEVENS R.TCP/IP ILLustrated Volume 1 The Protocols[Z].U.S.2000.4.
  • 7GASTI P, TSUDIK G, UZUN E, et al. DoS and DDoS in named data networking [ J ]. International Conference on Computer Communications and Networks, 2013, 44 (3) : 1-7.
  • 8ZARGAR S T, JOSHI J, TIPPER D. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks[J]. Communications Surveys & Tutorials, 2013, 15(4) : 2046-2069.
  • 9PENG T, LECKIE C, Ramamohanarao K. Survey of net- work -based defense mechanisms countering the DoS and DDoS problems [J] . ACM Computing Surveys, 2007, 39(1): 3.
  • 10JEON D. Understanding DDoS attack, tools and free anti - tools with recommendation [ EB/OL ]. [ 2014 - 08 - 25 ] . http: //www. sans. org/infoseFAQ/threats/Under- stamding ddos. htm.

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部