期刊文献+

DDoS攻击原理及防御方法分析 被引量:2

Analysis of Principle and Defense of DDoS Attacks
下载PDF
导出
摘要 DDoS(分布式拒绝服务)攻击是目前对互联网的安全稳定性带来较大威胁的攻击形式之一,给各电信运营商、互联网服务商、金融企业等一大批重要的互联网用户带严峻挑战。因此,对其攻击机理以及防御方法的研究近年来引起了人们的普遍关注。为了寻求有效应对DDoS攻击的防御策略,探讨了DDoS攻击的原理、分类,并对目前一些主流的防御方法进行了深入研究,分析和比较了各自所具有的优缺点。提出了采取大范围分布式防御、多技术融合、主动防御的应对方法和建议。 DDos (distributed denial of service) attacks are currently on the Internet security threat to the stability of the larger form of attack, to the telecom operators, Internet service providers, financial finns, such as a large number of Interact users with important challenges. Therefore, the mechanism of their attack and defense methods in recent years has aroused widespread concern. In order to seek an effective response to DDoS attacks on the defense strategy, discusses the principle of DDoS attacks, classification, and presents some of the mainstream of defense indepth research, analysis and compared with their respective advantages and disadvantages. Finally, take the large- scale distributed defense, multi - technology integration, active defense response methods and recommendations.
出处 《计算机技术与发展》 2009年第7期156-158,162,共4页 Computer Technology and Development
基金 广东省自然科学基金项目(04010589)
关键词 分布式拒绝服务 互联网安全 防御系统 distributed denial of service Intemet security defense system
  • 相关文献

参考文献8

二级参考文献30

  • 1Andrew s.Tanenbaum 计算机网络(第四版)[M].北京:清华大学出版社,2004.
  • 2Jie Wu.Distributed Systems Design.CRC Press LLC,1999中译本,北京:机械工业出版社,2001.
  • 3Yang Xinyu,Yang Wenjing,Zeng Ming,et al.A Novel Network Traffic Analysis Method Based on Fuzzy Association Rules.LNAI,2004:81-91.
  • 4[美]Michael A Gallo,William M Hancock.计算机通信和网络技术[M].王玉峰,邹仕洪,黄东晖,等译.北京:人民邮电出版社,2003.
  • 5应向荣.主动防御系统的重要性[N].中国计算机报,网络与通信,2003,7.
  • 6Crocker S D.Protecting the Internet From Distributed Denial-of-Service Attacks:A Proposal[J].Proceedings of the IEEE,2004,92(9):1 375-1 381.
  • 7Mirkovic J,Prier G,Reiher P.Source-end DDoS Defense,Network Computing and Applications,2003.NCA 2003.Second IEEE International Symposium on,2003:171-178.
  • 8Mankins D,Krishnan R,Boyd C,et al.Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing,Computer Security Applications Conference,2001.ACSAC 2001.Proceedings 17th Annual,2001:411-421.
  • 9Huegen C A.The latest in denial of service attacks:"Smurfmg"description and information to minimize effects[EB/OL].2000.http://www.pentics.net/denial-of-service/white-papers/smurf.cgi-visited.
  • 10Jins,Yeung D S.A covariance analysismodel for DDoS attack detection[C].Paris,France:IEEE International Conference on Communications,2004.

共引文献16

同被引文献18

  • 1李兴国,雷若寒.利用准入控制实现校园网的安全管理[J].微计算机信息,2008,24(12):47-48. 被引量:22
  • 2段海新,王左利.802.1X:期待与问题并存[J].中国教育网络,2008(2_3):10-11. 被引量:5
  • 3魏克,段海新.校园网安全关键技术解析一 身份认证管理与准入控制[J].中国教育网络,2005(9):13-15. 被引量:11
  • 4Sperotto A. An Overview of IP Flow-based Intrusion Detection[J]. IEEE Communications Surveys & Tutorials, 2010, 12(3): 343-356.
  • 5Yang Yahui, Jiang Dianbo, Xia Min. Using Improved GHSOM for Intrusion Detection[J]. Journal of Information Assurance and Security, 2010, 5(3): 232-239.
  • 6Bernaille L, Soule A, Akodjenou I, et al. Blind Application Recognition Through Behavioral Classi?cation[EB/OL]. (2009-02-06). http://www.cl.cam.ac.uk/~awm22/publications/ moore2005discriminators.pdf.
  • 7Bernaille L, Teixeira R, Salamatian K. Early Application Iden- ti?cation[C]//Proc. of International Conference on Emerging Networking Experiments and Technologies. Lisboa, Portugal: [s. n.], 2006.
  • 8Huang Nen-Fu, Jai Gin-Yuan, Chao Han-Chieh. Early Identi- fying Application Traffic with Application Characteristics[C]// Proc. of IEEE International Conference on Communications. [S. l.]: IEEE Press, 2008.
  • 9Kayacik H G, Heywood N Z, Heywood M I. Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD99 Intrusion Detection Datasets[C]//Proc. of the 3rd Annual Conference on Privacy, Security and Trust. [S. l.]: Springer, 2005.
  • 10Li Zhinchun, Gao Yan, Chen Yan, et al. Towards a High-speed Router-based Anomaly/Intrusion Detection System[C]//Proc. of ACM Sigcomm’05. [S. l.]: ACM Press, 2005.

引证文献2

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部