期刊文献+

DDoS攻击及其防御技术研究 被引量:10

Research on DDoS Attacks and Its Defense Techniques
下载PDF
导出
摘要 介绍分布式拒绝服务攻击(DDoS)的相关知识,包括攻击原理、攻击类型和攻击工具等,从攻击前、攻击时和攻击后3个方面论述DDoS攻击的防御技术,对攻击时的过滤技术的分析。 Introduces related knowledge of Distributed Denial of Service(DDoS) attacks, including principle of the attack, attack types, and attack tools, then discusses DDoS defense techniques based on three aspects: before the attack, during the attack, and after the attack. In this part, it lays emphasis on the analysis of filtering techniques during the attack, analyzes the filter techniques during the attack.
作者 叶建成
出处 《现代计算机》 2008年第1期67-69,共3页 Modern Computer
关键词 DDOS攻击 IP欺骗 过滤 DDoS(Distributed Denial of Service) Attacks IP Spoofing Filtering
  • 相关文献

参考文献8

  • 1CERT Coordination Center. CERT Incident Note IN-99-07 Distributed Denial of Service Tools. http://www.cert.org/incident_notes/IN-99-07.html
  • 2CERT Coordination Center. CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks. http://www.cert .org/advisories/CA- 1996-21 .html
  • 3CERT Coordination Center. CERT Advisory CA-1996-01 UDP Port Denial-of-Service Attack. http://www.cert.org/advisories/CA- 1996-01 .html
  • 4Dave Dittrich. Distributed Denial of Service (DDoS) Attacks/tools.http://staff.washington.edu/dittrich/misc/ddos/
  • 5C. Jin, H. Wang and K. G. Shin. Hop-Count Filtering: An Effective Defense Against Spoofed DDoS Traffic. In Proceedings of the 10th ACM Conference on Computer and Communications Security, October 2003
  • 6A. Yaar, A. Perrig and D. Song. Pi: A Path Identification Mechanism to Defend Against DDoS Attacks. In Proceedings of the 2003 IEEE Symposium on Security and Privacy, May 2003
  • 7Merike Kaeo.网络安全性设计(第二版).吴中福等译.北京:人民邮电出版社,2005:178-188
  • 8孙曦,朱晓妍,王育民.DDoS下的TCP洪流攻击及对策[J].网络安全技术与应用,2004(4):31-34. 被引量:10

共引文献9

同被引文献30

引证文献10

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部