期刊文献+

IPv6隧道代理机制中的DDoS攻击安全性分析 被引量:1

Security analyzing DDoS Attacks on IPv6 Network
下载PDF
导出
摘要 DDoS攻击是当今IPv4网络上最严重的威胁之一,IPv6网络在安全性方面的设计十分优越,但由IPv4过渡到IPv6网络还需要一些转换机制,本文对转换机制中存在的安全问题进行了介绍,并着重分析了TunnelBroker(隧道代理)机制下的DDoS攻击。 Even now DDoS (Distributed Denial of Service) attack is still the major threat in IPv4 network.. By taking into considerations of security issue, IPv6 network is believed to be more secure than IPv4 network.. However, to make IPv6 network coexist with current IPv4 network, people purpose different kinds of IPv6-IPv4 transition mechanisms.In this paper, security analysis of IPv6-IPv4 transition mechanisms was performed, especially DDoS attacks on tunnel broker mechanisms.
出处 《微计算机信息》 北大核心 2005年第12X期10-12,共3页 Control & Automation
基金 国家科技部863项目 IPV6/IPV4转换互通和根DNS研究(编号:2001AA112136)
关键词 DDOS攻击 IPV6 隧道代理机制 安全性 转换机制 DDoS, UPv6, Tunnel Broker
  • 相关文献

参考文献5

  • 1S.Deering,R.Hinden.Internet Protocol,Version6 (IPv6) Specification[S].RFC 2460,December 1998..
  • 2P.Metzger,W.Simpson.IP Authentication using Keyed MD5[S].RFC1828,August 1995..
  • 3洪家平.WINDOWS环境下PC机与单片机的通信[J].微计算机信息,2005,21(3):143-144. 被引量:13
  • 4Templin,Gleeson,Talwar,M.and D.Thaler.Intra-Site Automatic Tunnel Addressing Protocol (ISATAP).draft-ietf-ngtrans-isatap-22 (work in progress),May 2004..
  • 5P.Savola,C.Patel.Security Considerations for 6to4 draft-ietf-v6ops6to4-security-03.txt.June 17,2004,work in progress..

共引文献12

同被引文献6

  • 1李金明,王汝传.基于VTP方法的DDoS攻击实时检测技术研究[J].电子学报,2007,35(4):791-796. 被引量:18
  • 2LELAND W E, TAQQU M S, WILLINGER W, et al. On the self-similar nature of Ethernet traffic [J]. Extended version IEEE/ ACM Trans. on Networking, 1994, 2-1:1-15.
  • 3RFC2460, Intemet Protocol, Version 6 (IPv6) Specification [S]. 1998.
  • 4LI Ming. Change trend of averaged Hurst parameter of traffic under DDoS flood attacks [J], Computers & Security 2006(25): 213 -220.
  • 5The 1999 DARPA Intrusion Detection Evaluation Data set, Information Systems Technology Group of MIT Lincoln Laboratory [DB/OL]. http://www.U.mit.edu/IST/ideval.
  • 6胡龙茂,周健,张伟.基于SYN的DDoS攻击的判定和过滤机制[J].微计算机信息,2008,24(15):74-76. 被引量:3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部