期刊文献+

没有防火墙的网络攻击行为研究

Research on Attacks from Network without the Firewall
下载PDF
导出
摘要 介绍了防火墙技术的功能,分析了网络攻击的一般过程,设计了没有防火墙的网络攻击并模拟其实现过程。 The paper introduces the function of firewall,analyzes the normal process of netword attack,and designs the attacks from network without the firewall and simulates the process of the realization.
作者 王玉荣 WANG Yu-rong ( Yancheng Semor Vocational Schools,Yancheng 224001,China )
出处 《电脑知识与技术》 2007年第7期48-50,共3页 Computer Knowledge and Technology
关键词 防火墙 网络攻击 模拟 Firewall Network attack Simulation
  • 相关文献

参考文献2

二级参考文献12

  • 1[1]W.Richard Stevens.TCP/IP Illustrated[M].Volume 1 :The Protocols. Addison Wesley, 1994
  • 2[2]TCP SYN Flooding and IP Spoofing Attacks[M].CERT Advisory CA-96.21 ,Sept, 1996
  • 3[3]SUN′sTCP SYN Flooding Solutions[DB].http://www.ciac.org/ciac/bulletins/h-02.html, Oct, 1996
  • 4[4]Denial-of-Service Attacks[DB].http://www.zdnet.com/pcmag/pctech/content/17/08
  • 5[5]Denial of Service Attacking with TCP SYN flooding[DB].http://www. cert.org.tw, Jan, 2000
  • 6[6]The RepSec,Inc.denial-of-serviee database[DB].http://www.repsec. com/denial .
  • 7[7]Christoph L.Schuba. Analisis of a Denial of Sevice Attack on TCP [M].Coast Laboratory,Department of Computer Seienee,Purdue University
  • 8Manzano Y. Tracing the Development of Denial of Service Attacks: A Corporate Analogy. 2003. Copyright 2003, The Association forComputing Machinery, Inc.
  • 9T V Lakshman and D Stiliadis. High Speed Policy-based Packet Forwarding Using Efficient Multi-dimensional Range Matching. Proceedings of ACM SIGCOMM'98,September 1998.
  • 10W.RichardStevens著 范建华 胥光辉 张涛译.TCP/IP协议详解卷1:协议[M].机械工业出版社,..

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部