期刊文献+

IPv6下DoS/DDoS源地址伪造攻击的检测

Detecting the forged IP source address of DoS/DDoS attack under IPv6
下载PDF
导出
摘要 IP源地址欺骗是绝大部分DoS/DDoS攻击的典型特征,通过分析其攻击的目的和目前防御的主要手段,提出了在IPv6下将源地址伪造的检测放在伪造发生的本地网络中进行检测的新技术. To provide a wrong IP source address is the typical characteristic of most of the DoS/DDoS attack. After studying the purpose of the attack and the major methods of defense, the author in this paper has put forward a new way(technology) of detecting the forged IP source address under IPv6 by putting it back to the network where it is forged under.
出处 《华中师范大学学报(自然科学版)》 CAS CSCD 2008年第4期518-522,共5页 Journal of Central China Normal University:Natural Sciences
基金 国家自然科学基金项目(60773083).
关键词 IPV6 DOS/DDOS攻击 伪造 检测 IPv6 Denial of Service/Distributed Denial of Service attack forged detect
  • 相关文献

参考文献5

  • 1Ferguson P, Senie D. Network denial of service attacks which spoofing [ EB/OL ]//IETF RFC tools, ietf. org/html/rfc2827. ingress filtering: defeating employ IP source address 2267, 1998. url: http://
  • 2Park K, Lee H. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets[J]. ACM Sigcomm, 2001,31(4) : 15-26.
  • 3Hinden R, Deering S. IP Version 6 Addressing Architecture [EB/OL]//IETF RFC 4291, 2006. url: ftp://ftp, isi. edu/ in-notes/rfc4291, txt.
  • 4吴庆涛,邵志清,钱夕元.基于网络连接分析的DDoS攻击检测模型[J].计算机工程,2006,32(10):135-136. 被引量:6
  • 5顾俊佳,李宁.网络DDoS攻击流的小波分析与检测[J].计算机工程与应用,2006,42(5):127-130. 被引量:6

二级参考文献13

  • 1Chang R K C, Defending against flooding-based distributed denial-of-service attacks:a tutorial[J],Communications Magazine,IEEE,2002; 40(10).
  • 2Xianjun Geng,Whinston A B.Defeating distributed denim of service attacks[J].IT Professional,2000;2(4) :36-42.
  • 3Laura Feinstein,Dan Schnackenberg,Ravindra Balupari et al.Statistical Approaches to DDoS Attack Detection and Response[C].In:DARPA Information Survivability Conference and Exposition, Proceedings, IEEE,2003 : 303-314.
  • 4Roshan Thomas,Brian Mark,Tommy Johnson et al, NetBouncer:Client-legitimacy-based High-performance DDoS Filtering[C].In:Proceedings of the DARPA Information Survivability Conference and Exposition, IEEE, 2003.
  • 5Stephane Mallat ,Wen Liang Hwang.Singularity Detection and Processing with Wavelets[J].IEEE TRANSACTIONS ON INFORMATION THEORY, 1992,38 (2).
  • 6除长发 李国宽.实用小波方法[M].华中科技大学出版社,..
  • 7.[EB/OL].http ://ita.ee.lbl.gov/html/traces.html,.
  • 8Peng Tao,Leckie C,Ramamohanarao K.Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring[C].Third International IFIP-TC6 Networking Conference,Athens,Greecea,2004:771-782.
  • 9Park K,Lee H.On the Effectiveness of Router-based Packet Filtering for Distributed DoS Attack Prevention in Power-law Internet[C].Proceedings of the 2001 ACM S1GCOMM Conference,San Diego,USA:2001:15-26.
  • 10Yau D K Y,Lui J C S,et al.Defending Against Distributed Denial-of-Service Aattacks with Max-min Fair Server-centric Router Throttles[C].Tenth International Workshop on Quality of Service,Miami,USA,2002:35-44.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部