期刊文献+

层次化的主机抗DoS攻击能力测试方法

Hierarchical DoS attack resistant testing method of host
下载PDF
导出
摘要 在基于协议的DoS攻击分类方法完备性分析和针对主机的DoS攻击效果层次性分析的基础上,建立了TCP/IP协议层次与常用DoS攻击方法及其对主机影响的指标集的层次性对应关系,提出了针对重要主机的层次化抗DoS攻击能力综合测试方法及其流程,并结合实例说明了层次化主机抗DoS攻击能力测试的完备性及其有效性。 The connection between common DoS attack and the index that they influence based on TCP/IP protocol stack on the basis ot analyzing the DoS classification based on protocols and DoS attack impact's hierarchical analysis. A hierarchic DoS attack testing method of host is proposed. To validate our idea and illustrate the completeness, an example is given to illustrate our hierarchic DoS attack resistant testing method.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第9期2189-2191,2194,共4页 Computer Engineering and Design
基金 国防预研基金项目
关键词 抗攻击测试 拒绝服务 攻击分类 攻击效果 层次化 attack resistanttesting DoS attack classification attack effect hierarchical
  • 相关文献

参考文献8

  • 1Johnson H, Qaisrani B, Fiedler M, et al. Hierarchical defense structure for mitigating DoS attacks [C]. Mauritius: Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006: 83-83.
  • 2Gabriel Maciá-Fernández. Evaluation of a low-rate DoS attack against iterative servers [J]. Computer Networks: The International Journal of Computer and Telecommunications Networking, 2007,51(4):1013-1030.
  • 3Pete Perlegos. DoS defense in structured peer-to-peer networks [R]. Berkeley: University of California, 2004.
  • 4易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 5谭艳霞,吴灏.基于免疫的对等网络DoS攻击防御系统[J].计算机工程与设计,2006,27(22):4204-4206. 被引量:2
  • 6Ye Baoqing. Network denial-of-service classification, detection, protection[R]. Syracuse University, 2001:41-46.
  • 7胡影,鲜明,肖顺平.DoS攻击效果评估系统的设计[J].计算机工程与科学,2005,27(2):15-16. 被引量:9
  • 8Jelena Mirkovic.A user-centric metric for denial-of-service measurement[R].University of Delaware, 2007.

二级参考文献37

  • 1况晓辉,朱培栋,卢锡城.移动自组网络分布式组密钥更新算法[J].软件学报,2004,15(5):757-766. 被引量:18
  • 2WRichardStevens 范建华 译.TCP/IP详解卷一:协议[M].北京:机械工业出版社,2000..
  • 3Bruce Schneier. Attack Trees-Modeling Security Threats [J]. Dr Dobb's Journal, December 1999.
  • 4S. Corson, J. Macker. Mobile ad hoc networking (MANET):Routing protocol performance issues and evaluation considerations.RFC 2501, http://www. ietf. org/rfc/rfc2501. txt, 1999-01.
  • 5C. Schuba, I. Krsul, M. Kuhn, et al. Analysis of a denial of service attack on TCP. In: Proc. 1997 IEEE Symp. Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press,1997. 208~223.
  • 6Haining Wang, Danlu Zhang, Kang G. Shin. Detecting SYN flooding attacks. In: Proc. the 21st Annual Joint Conf. IEEE Computer and Communications Societies ( INFOCOM' 2002 ) .New York: IEEE Computer Society Press, 2002. 1530~1539.
  • 7Karthik Lakshminarayanan, Daniel Adkins, Adrian Perrig, et al.Taming IP packet flooding attacks. Computer Communication Review, 2004, 34(1): 45~50.
  • 8Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song. SIFF: A stateless Internet flow filter to mitigate DDoS flooding attacks. In:Proc. 2004 IEEE Symp. Security and Privacy. Oakland: IEEE Computer Society Press, 2004. 130~ 147.
  • 9P. Ferguson, D. Senie. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing.RFC 2267, http://www.ietf.org/rfc/rfc2267.txt, 1998-01.
  • 10CIAC. H-02: SUN's TCP SYN flooding solutions. Information Bulletin, http://www. ciac. org/ciac/bulletins/h-02. shtml, 1996-10.

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部