期刊文献+

抵御DDoS攻击的联动系统 被引量:2

Linked System for Defending DDoS Attacks
下载PDF
导出
摘要 介绍了DDoS攻击的方法和攻击环境,提出了抵御DDoS攻击的联动系统模型(路由器、防火墙、入侵监测系统组成),并采用了petri网工具将防御策略模型化。设置了具体的环境参量,并通过Matlab对联动系统的效果进行了简单的模拟。 By introducing the methods and the environments of DDoS attacks, the article presents a model of linked system based on router, firewali and IDS, and gives a specific solution modeled by Petri net. Briefly simulating the effects of the system by Matlab af- ter considering the elements that are -affect the availability of the linked system.
出处 《微计算机信息》 北大核心 2007年第30期118-119,138,共3页 Control & Automation
基金 总参通信部基金(编号不公开)
关键词 DDOS 联动系统 防火墙 PETRI网 DDoS, Linked system, Firewall, Petri net
  • 相关文献

参考文献5

  • 1Jun Xu, Wooyong.Lee.Sustaining Availability of Web Services under Distributed Denial of Service Attacks [J].IEEE TRANSACTIONS ON COMPUTERS, FEBRUARY 2003.VOL. 52, NO. 2.
  • 2Jelena Mirkovic, Gregory Prier, Peter Reiher.Source-End DDoS Defense[J]. Proceedings of the Second IEEE International Symposium on Network Computing and Applications NCA'03.
  • 3沈鑫,张来顺.DDoS防御机制研究[J].微计算机信息,2006,22(03X):61-64. 被引量:4
  • 4胡汉平,侯成帅,孔涛,郑映.基于主动防御模型的IP反向追踪方法[J].华中科技大学学报(自然科学版),2005,33(3):36-38. 被引量:3
  • 5H. Choi and J. Limb.A Behavior Model of a Web Traffic [J]. Proc. Int'l Conf. Network Protocols (ICNP '99), Sept. 1999.

二级参考文献4

  • 1ZHANG Bao-liang 1,2,HU Han-ping 1,2,WU Xiao-gang 1,2, KONG Tao 31.State Education Ministry Key Laboratory of Image Information and Intelligent Control, Wuhan 430074, Hubei, China,2.Institute of Pattem Recognition and Artificial Intelligonce, Huazhong University of Science and Technology, Wuhan 430074, Hubei, China,3.709th Research Institute of China Shipbuilding Engineering Society, Wuhan 430074, Hubei, China.A Network-Based VPN Architecture Using Virtual Routing[J].Wuhan University Journal of Natural Sciences,2005,10(1):161-164. 被引量:4
  • 2辛志东,李祥和,冉晓旻,童珉.局域网中的ARP重定向攻击及防御措施[J].微计算机信息,2005,21(08X):10-12. 被引量:17
  • 3Tanachaiwiwat, S. and Hwang, K, "Differential packet filtering against DDoS flood attacks." ACM Conference on Computer and Communications Security (CCS). Washington, DC, October 2003.
  • 4Kevin J Houle,George M Weaver. Trends in Denial of Service Attack Technology [R]. CERT/CC, 2001.10

共引文献5

同被引文献9

  • 1沈鑫,张来顺.DDoS防御机制研究[J].微计算机信息,2006,22(03X):61-64. 被引量:4
  • 2石兆军,赵禹.一种针对DDoS攻击的防御响应策略[J].实验科学与技术,2006,4(B12):69-71. 被引量:1
  • 3F Hsu, T Chiueh A Path Information Cashing and Aggregation Approach to Traffic Source Identification[C]. Rhode Istand:Proc. of the IEEE International Conference on Distributed System, 2003. 332-339.
  • 4SAVAGE S, WETHERALL D, KARL IN A, et al Practical Network Support for IP Traeeback [C]. Sweden:Proceedings of the 2000 ACM SIG2 COMM Conference, 2000. 295 - 306.
  • 5U.K.Tupakula, V.Varadharajan. Analysis of Automated Model against DDoS Attacks.2003.
  • 6JOHN I, STEVEN M B. Implementing Pushback: Router-Based Defense Against DDoS Attacks [A]. Network and Distributed System Security Symposium[C]. February 2002.
  • 7Yinan Jing,Zheng Xiao,Xueping Wang, et alo 02-DN: An Overlay-based Distributed Rate Limit Framework to Defeat DDoS Attacks*[C]. Mauritius:ICN/ICONS/MCL. 2006.467-476.
  • 8Cisco, "Strategies to Protect Against Distributed Denial of Sevrice ( DDOS ) Attacks" , http://www.cisco.com/en/US/tech/tk59/technologies_white_paper09186a0080174a5 b.shtml
  • 9X.Geng,A.B.Whinston, " Defeating Distributed Denial of Service attacks" , IEEE IT Professional, 2000, 2 (4)

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部