期刊文献+

基于协议转变的拒绝服务攻击技术的研究 被引量:4

Research on technology of DoS based on protocol transform
下载PDF
导出
摘要 提出了协议转变的概念,分析这种转变潜在的缺陷;在此基础上,着重阐述如何通过这种协议转换进行拒绝服务攻击,分析这种拒绝服务攻击手段的特点。最后,针对这种攻击手段提出了一些防御措施,并预测这种攻击手段的发展前景。 In this paper, protocol transform was put forward, and its potential limitations were analyzed. Based on the analysis, how to implement DoS attack by protocol transform was expounded, and the characteristics of DoS were analyzed. Finally, some protection measures against DoS were presented, and future fate of this attack method was also predicted.
作者 李树军
出处 《计算机应用》 CSCD 北大核心 2006年第10期2323-2325,共3页 journal of Computer Applications
关键词 协议转换 拒绝服务 网络攻击 网络安全 protocol transform DoS network attack network security
  • 相关文献

参考文献3

二级参考文献16

  • 1孙钦东,张德运,孙朝晖,张晓.基于流连接密度的分布式拒绝服务攻击检测[J].西安交通大学学报,2004,38(10):1048-1052. 被引量:5
  • 2杨余旺,杨静宇,孙亚民.分布式拒绝服务攻击的实现机理及其防御研究[J].计算机工程与设计,2004,25(5):657-660. 被引量:15
  • 3Haykin S. Adaptive Filter Theory. Third Edition. Upper Saddle River, New Jersey: Prentice-Hall, 1996
  • 4Vapnik V.N. The Nature of Statistical Learning Theory. NY: Springer-Verlag, 1995
  • 5Burges C.J.C. A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery, 1998, 2(2): 121~167
  • 6Boser B.E., Guyon I.M., Vapnik V.N. A training algorithm for optimal margin classifiers. In: Proceedings of the 5th Annual ACM Workshop on COLT, Pittsburgh, 1992, 144~152
  • 7Osuna E., Freund R., Girosi F. Training support vector machines: An application to face detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, San Juan, Puerto, Rico, 1997, 130~136
  • 8Platt J.C. Sequetial minimal optimization: A fast algorithm for training support vector machines. Microsoft Research: Technical Report MST-TR-98-14, 1998
  • 9Criscuolo P.J. Distributed denial of service- trin00, tribe flood network, tribe flood network 2000, and stacheldraht. Lawrence Livermore National Laboratory, Livermore, CA: Technical Report CIAC-2319, 2000
  • 10Lau F., Rubin S.H., Smith M.H., Trajkovic L. Distributed denial of service attacks. In: Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, Nashville, 2000, 2275~2280

共引文献55

同被引文献35

  • 1贾春福,林楷,鲁凯.基于端信息跳变DoS攻击防护机制中的插件策略[J].通信学报,2009,30(S1):114-118. 被引量:10
  • 2LEE H, THING V. Port hopping for resilient networks[A]. Conf 60th IEEE Vehicular Technology[C]. 2004.3291-3295.
  • 3BADISHIY G. HERZBERG A, KEIDAR I, et al. Keeping denial-of-service attackers in the dark[A]. Int Symp Distributed Computing (DISC)[C]. Springer-Vedag, 2005.18-31.
  • 4SIFALAKIS M, SCHMID S, HUTCHISON D. Network address hopping: a mechanism to enhance data protection for packet communications[A]. ICC 2005[C]. 2005.1518 - 1523.
  • 5BBN Technologies. Applications that participate in their own defense[EB/OL].http://apod.bbn.com. 2002.
  • 6ATIGHETCHI M, PAL P, WEBBER E et al. Adaptive use of net- work-centric mechanisms in cyber-defense[A]. Proc 6th IEEE Int Syrup Object-Oriented Real-Tune Distributed Computing [C]. 2003. 183-192.
  • 7FERRARI L. The aglets-2.0.2 user's manual[EB/OL], http://aglets. sourceforge.net. 2004.
  • 8Lee H C J, Thing V L L. Port hopping for resilient net- works [ C ] //2004 IEEE 60th Vehicular Technology Con- ference, 2004 : 3291-3295.
  • 9Badishi G, Herzberg A, Keidar I. Keeping denial-of-serv- ice attackers in the dark [ C ]//International Symposium Distributed Computing ( DISC ) , Springer-Verlag, 2005 : 18-31.
  • 10Sifalakis M, Schmid S, Hutchison D. Network address hopping: A mechanism to enhance data protection for packet communications [ C ] //2005 IEEE International Conference on Communications,2005 : 1518-1523.

引证文献4

二级引证文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部