期刊文献+

基于IAD的防DDoS攻击的实现 被引量:1

Realization of IAD-based Defend against DDoS attacks
下载PDF
导出
摘要 DDoS攻击是威胁因特网安全的重要手段,本文提出了一种基于IP地址数据库的实用方法来有效防御DDoS攻击,边界路由器保存所有以往在网络上出现的合法IP地址的记录,当边界路由器业务量过载时,利用这一记录来决定是否接受输入的IP包。 Distributed denial-of-service(DDoS)attacks present an immense threat to the Internet. we introduce a practical scheme to defend against Distributed Denial of Service (DDoS) attacks based on IP address database. The edge router keeps a history of all the legitimate IP addresses which have previously appeared in the network. When the edge router is overloaded, this history is used to decide whether to admit an incoming IP packet.
出处 《微计算机信息》 北大核心 2006年第02X期37-38,109,共3页 Control & Automation
基金 总装武器装备预研基金项目
关键词 DDOS IP地址数据库 hash技术 滑动窗口 DDoS IP Address Database(IAD) hash Techniques sliding window
  • 相关文献

参考文献4

  • 1陈海燕,季仲梅,李鸥,胡捍英.OSPF路由协议安全性分析及其攻击检测[J].微计算机信息,2005,21(5):230-231. 被引量:17
  • 2Burton H.Bloom.Space/time tradeoffs in hash coding with allowable errors.Communications of the ACM,13 (7):422-426,July 1970.
  • 3P.Ferguson and D.Senie.Network ingress filtering:Defeating denial of service attacks which employ IP source address spoofing.RFC2267,IETF,January 1998.
  • 4Tao Peng,Christopher Leckie,and Kotagiri Ramamohanarao.Defending against distributed denial of service attack using selective pushback.In Proceedings of the Ninth IEEE International Conference on Telecommunications (ICT 2002),Beijing,China,June 2002.

二级参考文献3

  • 1Moy J T. OSPF version 2 [S],RFC 2328.1998.
  • 2Jeff Doyle.Routing TCP/IP [Volume Ⅱ]. Cisco Press.1998.
  • 3Routing Protocol Security Requirements Internet Draft. IETF Network working Group. 2004.

共引文献16

同被引文献42

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部