期刊文献+

通过异常操作的网络入侵识别及防范

The Recognition and Defenses of Network Intrusion Detection via Exceptional Operations
下载PDF
导出
摘要 从网络协议和操作系统协的缺陷入手,分析IP分片攻击,TCP握手SYN洪水攻击及通过带外数据对存在漏洞的Windows系统进行攻击等网络入侵手段,并给出相应的防范措施,对保护系统防止更加复杂的分布式拒绝服务的攻击打下了良好的基础。 Proceeding with the defect of network protocols and OS protocol stacks, some network intrusions via exceptional operations are analyzed, including those of IP fragmentation attack, TCP handshaking with SYN flood attack and the attack to the bugged Windows systems using outside band data. Thus the corresponding measures to keep them away are given, which have made a reliable basis for system protection and prevention of attacks of more complicated distributed denial of service.
作者 唐洋 徐倩
出处 《重庆电力高等专科学校学报》 2008年第1期29-32,35,共5页 Journal of Chongqing Electric Power College
关键词 网络入侵 超小分片 重叠分片偏移 SYN洪水 network intrusion tiny fragment overlapped fragment offset SYN flood.
  • 相关文献

参考文献1

共引文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部