期刊文献+

拒绝服务攻击防范技术研究

Survey on Countermeasure Against Denial-of-Service Attacks
下载PDF
导出
摘要 拒绝服务攻击对网络构成了巨大的安全威胁.由于网络协议本身并不安全,所以处理拒绝服务攻击是非常困难的.从分析拒绝服务攻击的起因入手,揭示拒绝服务攻击的机制和过程,并对拒绝服务攻击进行归类,总结了防范拒绝服务攻击的措施. Denial-of-Service (DoS) attacks present a considerable security threat to the intemet. It is increasingly difficult to treat the Denial of Service attacks, because intemet protocol is inherently not secure. In this paper we analyze the causes of DoS attacks,exposes their various mechanisms and proceduresand and summarize the countermeasure of keeping away DoS attacks.
出处 《信阳师范学院学报(自然科学版)》 CAS 北大核心 2008年第4期626-629,共4页 Journal of Xinyang Normal University(Natural Science Edition)
基金 国家863计划项目(2005AA142150)
关键词 拒绝服务 缓解 集中 速率限制 追踪 denial-of-service mitigation aggregates rate-limiting trace-back
  • 相关文献

参考文献10

  • 1徐恪,徐明伟,吴建平.分布式拒绝服务攻击研究综述[J].小型微型计算机系统,2004,25(3):337-346. 被引量:33
  • 2林梅琴,李志蜀,袁小铃,周密,王雪松,童铭.分布式拒绝服务攻击及防范研究[J].计算机应用研究,2006,23(8):136-138. 被引量:11
  • 3赵英,倪铮,张莹莹.TCP SYN分布式拒绝服务攻击分析[J].微计算机信息,2006,22(08X):64-66. 被引量:4
  • 4David M, Geoffrey M V, Stefan S. Inferring Internet Denial-of-Service Activity[ C ]//Proceedings of 10th USENIX Security Symposium. Washington D C :USENIX Association, 2001:9-22.
  • 5Stefan S, David W, Anna K, et al. Practical Network Support for IP Traceback[ C]//Proceedings of ACM SIGCOMM 2000 Conference, Stockholm. Sweden : ACM SIGCOMM Computer Communication Review, 2000:295-306.
  • 6Haining W, Kang G S. Transport-Aware IP Routers : α Built-ln Protection Mechanism to Counter DDoS Attacks[J]. IEEE Transactions on Parallel and Distributed Systems ( S1045 -9219 ), 2003,14 (9) : 873-884.
  • 7Yoohwan K, Wing C L, Mooi C C,et al. Packet Score: a Statistical-Based Overload Control against DDoS Attacks[ C]//Proceedings of IEEE INFOCOM 2004. Hong Kong: IEEE Computer and Communications Societies, 2004:2594-2604.
  • 8Ratu! M, Steven M B, Sally Floyd V, et al. Controlling High Bandwidth Aggregates in the Network[J]. ACM SIGCOMM Computer Communication Review( S0146.-4833 ), 2002,32 (3) :62-73.
  • 9John I, Steven M B. Pashback : Router-Based Defense against DDoS Attacks [ C ]//Proceedings of ISOC Network and Distributed System Security Symposium. San Diego: NDSS, 2002:6-8.
  • 10Alex C S, Craig P, Luis A S, et al. Hash-Based IP TraceBack[ C ]//Proceedings of ACM SIGCOMM 2001 Conference. San Diego, CA: ACM SIGCOMM Computer Communication Review, 2001:3-14.

二级参考文献44

  • 1连洁,王杰.入侵检测系统在涉密计算机中的应用研究[J].微计算机信息,2005,21(10X):24-26. 被引量:8
  • 2[1]Kent S, Atkinson R. Security architecture for the internet protocol[S]. RFC2401, Nov. 1998.
  • 3[2]Harkins D, Carrel D. The internet key exchange(IKE)[S]. RFC2409, Nov. 1998.
  • 4[3]Moore D, Voelker G and Savage S. Inferring internet denial-of-service activity[C]. In Proceeding of 10th USENIX Security Symposium, 2001.
  • 5[4]Computer emergency response team[EB/OL]. Results of Distributed Systems Intruder Tools Workshop. http://www.cert.org/reports/dist-workshop-final.html, Nov. 1999.
  • 6[5][EB/OL].http://arbornetworks.com/
  • 7[6][EB/OL].http://www.astanetworks.com/products/vantage/
  • 8[7][EB/OL].http://www.entercept.com/products/
  • 9[8][EB/OL].http://www.mazunetworks.com/solutions/product-overview.html
  • 10[9]Rocky K C Chang. Defending against flooding-based distributed denial-of-service attacks: a tutorial[J]. IEEE Communications Magazine, October 2002.

共引文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部