期刊文献+

IPv6下TCP分片攻击的研究和检测实现

下载PDF
导出
摘要 IPv6相对于IPv4来说,有更好的安全特性,但不能完全消除网络攻击和入侵。通过分析IPv6下的分片重组机制以及IPv6分片重组在Snort入侵检测系统中的实现,设计了在Snort下进行TCP分片攻击的试验,实验表明只要入侵检测系统与服务器本身的TCP/IP堆栈对数据包的处理方式上存在着不同,TCP分片攻击是非常有效的从底层绕过入侵检测系统检测的攻击方式,最后给出了网络管理和配置的建议。
作者 廖光忠 胡静
出处 《计算机科学》 CSCD 北大核心 2006年第B12期53-55,共3页 Computer Science
  • 相关文献

参考文献6

二级参考文献21

  • 1[1]J P Anderson. Computer security threat monitoring and surveillance[R].Technical report. Fort Washington,Pennsylvania:James P Anderson Company, 1980.4
  • 2[2]Dorothy E Denning. An Intrusion-Detection ModeI[J].IEEE Transactions on Software Engineering, 1987.2; 13 (2): 222-232
  • 3[3]Teresa F Lunt,R Jagannathan,Rosanna Lee et al.IDES:The enhanced prototype,A real-time intrusion detection system[R].Technical Report SRI Project 4185-010,SRI-CSL-88-12,CSL SRI International,Computer Science Laboratory,SRI 1nt1.333 Ravenswood Ave.,Menlo Park,CA 94925-3493,UJSA, 1988.10
  • 4[4]D Anderson,T Frivold,A Valdes. Next-generation intrusion-detection expert system(NIDES)[R].Technical Report SRI-CSL-95-07,Computer Science Laboratory,SRI International,Menlo Park ,CA 94025-3493,USA, 1995.5
  • 5[5]Todd Heberlein,Gihan Dias,Karl Levitt et al.A network security monitor[C].In:Prnceedings of the 1990 IEEE Symposium on Research in Security and Privacy ,IEEE ,Los Alamitos ,CA ,USA :IEEE Computer Soo. Press, 1990: 296-304
  • 6[6]Mark Crosbie,Eugene H Spafford. Defending a Computer System Using Autonomous Agents[R].CSD-TR-95-022,Department of Computer Sciences, Purdue University, 1995
  • 7[7]S Staniford Chen,S Cheung,R Crawford et aI.GrIDS:A graph based intrusion detection system for large networks[C].In :Proceedings of the 19th National Information Systems Security Conference, 1996
  • 8[8]Gregory B White,Eric A Fisch,Udo W Pooch.Cooperating Security Managers:A Peer Based Intrusion Detection System[J].lEEE Network,1996; (1/2) :20~23
  • 9[9]Philip A Porras,Peter G Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances[C].In :Proceedings of the 20th National Information Systems Security Conference,Baltimore,Maryland ,USA:National Institute of Standards and Technology/National Computer Security Center, 1997:353-365
  • 10[10]Robert Flood,Ewart Carson. Dealing with complexity-An introduction. to the theory and application of systems science[M].second elition,New York:Plenum Press, 1993:151-158

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部