期刊文献+

DDoS攻击原理与防御 被引量:3

The principle and defending of DDoS attack
下载PDF
导出
摘要 该文介绍了DDoS攻击原理和攻击过程,从预防、检测和响应3个方面分析了防御DDoS攻击的技术和方法,阐述了几种较为典型的应用。最后,针对目前DDoS攻击防御研究现状提出了防御攻击的方法和建议。 Described the principle and process of distributed denial of service attack, the methods and technologies that prevention, detection and respond of DDoS attack were analyzed, and then elaborated some kinds of relatively typical applications, Finally according to the development of the defending DDoS attack some methods and suggestions are proposed.
机构地区 西安通信学院
出处 《计算机安全》 2008年第7期93-95,共3页 Network & Computer Security
关键词 DDOS攻击 防御 检测 响应 DDoS attack defend detect respond
  • 相关文献

参考文献1

二级参考文献49

  • 1孙知信,唐益慰,程媛.基于改进CUSUM算法的路由器异常流量检测[J].软件学报,2005,16(12):2117-2123. 被引量:27
  • 2MIRKOVIC J,PRIER G,REIHER P.Attacking DDoS at the Source[C]// Proceedings 10th IEEE International Conference,2002:312-321.
  • 3MIRKOVIC J,PRIER G,REIHER P.Source-end DDoS Defense[C]// Network Computing and Applications,2003:171-178.
  • 4MIRKOVIC J,REIHER P.D-WARD:a source-end defense against flooding denial-of-service attacks[J].Dependable and Secure Computing,2005,2(3):216-232.
  • 5KANG Jian,ZHANG Zhe,JU Jiu bin.Protect e-commerce against DDoS attacks with improved D-WARD detection system[C]// IEEE International Conference,2005:100-105.
  • 6BASSEVILLE M,NIKIFOROV I V.Detection of Abrupt Changes[J].Theory and Application,1993,14:23-29.
  • 7BRODSKY B E,DARKHOVSKY B S.Non-parametric Methods in Change point Problems[J].Kluwer Academic,1993,23:46-52.
  • 8KENT S,R Atkinson.Security architecture for the Internet protocol[C]// Preiodical Issue-Article,1998:42-60.
  • 9KENT S,ATKINSON R.IP authentication header[S].The IP Security Protocol Working Group,1998.
  • 10FERGUSON P,SENIE D.Network ingress filtering:defeating denial of service attacks which employ IP source address spoofing[S].RFC2267,1998.

共引文献7

同被引文献14

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部