期刊文献+

探讨入侵检测系统中的DoS/DDos攻击方法

Discussion on DoS/DDos Attacks in Intrusion Detection System
下载PDF
导出
摘要 随着计算机网络技术的广泛应用,黑客对网络的破坏行为日渐增多,使得网络安全成为人们异常关心并且亟待解决的问题。本文从入侵检测系统入手,深入地研究了存在时间最长、破坏力最广的DoS/DDos攻击,以期找出防御这种攻击的方法及措施,减少其带来的损害。 With the wide application of computer network technology, the destruction behavior by hackers is increasing in the network, which makes the network security become the problem to be widely concerned and urgent solved. Starting from the intrusion detection system, this paper deeply studied DoS/DDos attacks, which lived for the most years and had the greatest destructive power, in order to find out defending methods and reduce the harm of it.
出处 《长春师范学院学报(自然科学版)》 2009年第2期24-28,共5页 Journal of Changchun Teachers College
关键词 入侵检测系统 攻击 黑客 网络安全 intrusion detection system attack hacker network security
  • 相关文献

参考文献5

  • 1张伟,王绍棣.DoS/DDoS数据两阶段聚类算法[J].小型微型计算机系统,2008,29(2):297-303. 被引量:1
  • 2胡亮,康健,赵阔,孟凡二.入侵检测系统[J].吉林大学学报(信息科学版),2002,20(4):46-53. 被引量:10
  • 3Mirkovic J,Reiher P.Ataxonomy of DDoS attack and DDoS defense mechanisms[J].ACM SIGCOM M Computer Communication Review,2004,34(2):39-53.
  • 4Mukherjee B,Levitt T L.Network intrusion detection[J].IEEE Network,1994,8(3):26-41.
  • 5CERT Coordination Center.CERT/CC Statistics for through[EB/OL].http://www.cert.org/stats/cert-stats.html,2000-01-03.

二级参考文献59

  • 1Helmer G,Wong J,Slagell M,et al. A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System[A]. Proceedings, Symposium on Requirements Engineering for Information Security[C]. Indianapolis IN USA:[s.n.],2001.
  • 2Jansen W,Mell P,Karygiannis T,Marks D. Mobile Agents In Intrusion Detection And Response[A]. In proceedings of the 12th annual Canadian Information Technology Security Symposium[C].Ottawa Canada:[s.n.],2000.
  • 3Bradshaw J M. Software Agents(chapter 1)[M].California: AAAI Press/The MIT Press, 1997.3-46.
  • 4Venema W. TCP WRAPPER: Network monitoring, access control and booby traps[A]. In USENIX Association, editor, UNIX Security III Symposium[C].California USA:IEEE press,1992.14-17.
  • 5Ilgun K,Kemmerer R A,Porras P A. State transition analysis: A rule-based intrusion detection approach[J]. IEEE Transaction on Software Engineering,1995,21(3):181-199.
  • 6Vigna G,Kemmerer R A. NetSTAT: A Network-based Intrusion Detection Approach[A]. In Proceedings of the 14th Annual Computer Security Application Conference[C].Scottsdale: Arizona,1998.
  • 7Balasubramaniyan J S,Garcia-Fernandez J O,Isacoff D,Spafford E,Zamboni D. An Architecture for Intrusion Detection using Autonomous agents[R]. COAST Technique Report, COAST Laboratory, Purdue University, 1998.
  • 8Helmer G,Wong J,Honavar V,Miller L. Automated Discovery of Concise Predictive Rules for Intrusion Detection[R]. Department of Computer Science Technical Report 99-01, January, 1999.
  • 9Lee W,Stolfo S J. Data Mining Approaches for Intrusion Detection[A]. In Proceedings of the 7th USENIX Security Symposium[C].[s.l.]:[s.n.] ,2000.
  • 10Stani ford Chen S,Cheung S,et al. GrIDS-A graph based intrusion detection system for large networks[A]. In Proceedings of the 19th National Information Systems Security Conference[C].[s.l.]:[s.n.],1996.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部