期刊文献+

一种基于分布式的DDos防御体系设计

Technology of a Defending Structure Against DDos Based on Distributed Tactics
下载PDF
导出
摘要 首先深入分析和评价了目前DDos攻击的防御策略,然后针对它们的不足,提出了一种分布式协同防御的DDos防御体系,该体系将防御节点分布式部署于ISP网络的各个位置,通过统一的管理方式,采用受害端检测,源端防御的策略来实现对DDos攻击的有效防御。 This article briefly analyze and evaluate the existed technology of the tactics against DDos,and then a structure based on distributed tactic and coordinated defending is presented and designed to improved them.The structure deploys the defending nodes distributedly which are managed unifiedly in a ISP network,It adopts a efficient technique that the attack is detected in victim network and recovered in source network.
出处 《微处理机》 2009年第5期52-54,58,共4页 Microprocessors
关键词 分布式 ISP网络 协同防御 统一管理 Distributed ISP network Coordinated defending Manage unifiedly
  • 相关文献

参考文献5

  • 1DouglasEComer,著.用TCP/IP进行网际互联第一卷:原理、协议与结构(第四版)[M].林瑶,蒋慧,译.北京:电子工业出版社,2001.
  • 2Jin - Tae Oh, Sang - Kil Park and etc, Detection of DDoS and IDS Evasion Attacks in a High - Speed Networks Environment [ J ]. International Journal of Computer Science and Network Security ,2007,7(6) , :124 - 131.
  • 3孙知信,唐益慰,张伟,宫婧,王汝传.基于特征聚类的路由器异常流量过滤算法[J].软件学报,2006,17(2):295-304. 被引量:15
  • 4樊隽,金烨.网络入侵检测中协同信息的安全传输(英文)[J].南京师范大学学报(工程技术版),2002,2(3):42-45. 被引量:5
  • 5J Mirkovic, G Prier, P Reiher. Attacking DDoS at the Source [ C ]. IEEE International Conference on Network Protocols, Paris, France, November 2002.

二级参考文献8

  • 1[1]Gong Jian, Lu Sheng, Wang Qian. Computer Network Security Conspectus[ M]. First Edition. Published by Southeast University, Nanjing: Song Zengmin, 2002,1 ~ 290.
  • 2[2]Douglas E Comer,David L Stevens. Internetworking with TCP/IP Vol. Ⅲ :Client-Server Programming and Applications [M]. Second Edition, Prentice Hall Inc, 1998 ,1 ~403.
  • 3[3]Charlie Kaufman, Radia Perlman, Mike Speciner. Network Security: Private Communication in a Public World [ M ]. First Edition. Prentice Hall Inc, 1995,1 ~205.
  • 4[4]Liu Jianhang. The PKI based CA[Degree dissertation] [D]. Preserved in Nanjing: Southeast University. 1999.
  • 5[5]J Callas. OpenPGP Message Format[ DB/OL]. http://www. ietf. org, 1998/2002.
  • 6[6]B Feinstein. The Intrusion Detection Exchange Protocol (IDXP)[DB/OL]. http://www.ietf.org,2002/2002.
  • 7梁丰,David Yau.利用路由器自适应限流防御分布拒绝服务攻击(英文)[J].软件学报,2002,13(7):1220-1227. 被引量:10
  • 8李旺,吴礼发,胡谷雨.分布式网络入侵检测系统NetNumen的设计与实现[J].软件学报,2002,13(8):1723-1728. 被引量:31

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部