期刊文献+

路由器防范拒绝服务攻击技术研究 被引量:1

A Study on the Protection Techniques of Routers against Denial of Service Attacks
下载PDF
导出
摘要 拒绝服务攻击给网络安全带来了巨大的威胁,防范DDoS攻击一直是安全领域的一个重要课题。介绍了路由器防范拒绝服务攻击的技术,包括IP路径重构技术、在源端防范DDoS策略、防范IP地址欺骗的机制和基于拥塞控制的方法,指出了进一步的研究方向。 Denial of service attacks have brought tremendous threat to the networks so that defeating DDoS attacks has been a key issue in the security field. This paper introduces the protection techniques of routers against DDoS attacks and classifies them into four, including the technique of IP traceback, the policy of defeating DDoS at the source, the scheme of defeating IP address spoofing and the method of congestion control, Finally further research directions are also included
作者 仲燕 孙知信
出处 《南京邮电学院学报(自然科学版)》 2005年第6期90-94,共5页 Journal of Nanjing University of Posts and Telecommunications
基金 华为基金(YJCB2005027NP) 中兴基金 教育部留学回国人员科研启动基金 南京市留学回国人员科技活动择优资助经费资助项目
关键词 拒绝服务 分布式拒绝服务攻击 路由器 Denial of service Distributed denial of service Router
  • 相关文献

参考文献23

  • 1GARBER L.Denial-of-service attacks rip the internet[J].Computer,2000,33(4):12~17.
  • 2Computer Emergency Response Team.Denial-of-Service developments[EB/OL].http://www.cert.org/advisories/CA-2000-01.html,2000.
  • 3The CERT Coordination Center.Results of the Distributed-Systems Intruder Tools Workshop[EB/OL].http://www.cert.org/reports/dsit_workshop-final.html
  • 4GENG Xianjun,WHINSTON A.Defeating distributed denial of service attacks[J].IT Professional,2000,2(4):36~42.
  • 5SAVAGE S,WETHERALL D,KARLIN A,et al.Practical Network Support for IP Traceback[J].Proceedings of the conference on Applications,Technologies,Architectures and Protocols for Computer Communication,2000,30(4):295~306.
  • 6SONG D,PERRIG A.Advanced and authenticated marking schemes for IP traceback[J].Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies,2001,2:878~886.
  • 7YAEAR A,PERRIG A,SONG D.Pi:A path identification mechanism to defend against DDoS attack,Security and Privacy[A].In:Proceedings of 2003 Symposium[C].2003.93~107.
  • 8CHOI K,DAI H.A marking scheme using Huffman codes for IP traceback[A].Parallel Architectures,Algorithms and Networks[C].2004.421~428.
  • 9HUSSAIN A,HEIDEMANN J,PAPADOPOULOS C.A Framework for Classifying Denial of Service Attacks[A].In:Proceedings of ACM SIGCOMM[C].2003.99~110.
  • 10MIRKOVIC J,PRIER G,REIHER P.Attacking DDoS at the source[A].Network Protocols[C].2002.312~321.

同被引文献6

  • 1Garher L. Denia - of-Servic Attacks Rip the Internet [ J ]. Computer,2000,33 (4) : 12 - 17.
  • 2Lee R B. CE- L 2003 - 003, Taxonomies of Distrihuted Denial of Service Networks, Attacks, Tools, and Countermeasures[R]. Department of Electrical Engineering, Princeton University,2003.
  • 3Braden B, Clark D. Recommendations on Queue Management and Congestion Avoidance in the lntemet[S]. RFC2309. Network Working Group, 1998.
  • 4Floyd S, Jaoobson V. Random early detection gateways for eongesti onavoidance[J ]. IEEE/ACM Transactions on Networking, 1993,1 (4) :397 - 413.
  • 5忽海娜,冯浩,王中立.DDoS攻击下高带宽聚类的控制[J].计算机技术与发展,2008,18(4):155-157. 被引量:2
  • 6杨凯锋,洪佩琳,束永安,李津生.Internet路由器中的拥塞控制策略[J].小型微型计算机系统,2000,21(4):353-356. 被引量:6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部