期刊文献+

基于SYN Cookie与智能过滤的DDoS攻击防御方案

Design of Anti-DDoS Attack Based on SYN Cookie and Intelligent Filtering
下载PDF
导出
摘要 分布式拒绝服务(DDoS)攻击是互联网目前最大的威胁之一,而且随着网络的普及以及网络技术的发展,防御也变得愈加困难。针对这种情况,提出了一种基于SYN Cookie与智能过滤双重防御机制的设计方案。实验证明,该方案可以较准确、高效地防御DDoS攻击。 Distributed Denial of Service(DDoS) attack has now become one of the most threat in Internet,and its defending has been more difficult with the popularization of network and the development of network technology.For the point,this paper presents a design of DDoS defence based on SYN Cookie and intelligent filtering.A experiment shows the design can defend the DDoS attack exactly and efficiently.
机构地区 广东省湛江市
出处 《微处理机》 2009年第5期55-58,共4页 Microprocessors
关键词 分布式拒绝服务 智能过滤 边界路由器 Distributed Denial of Service Intelligent filtering Border Router
  • 相关文献

参考文献5

  • 1U Tariq, M Hong, et al. A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques [ J ].Advanced Data Mining and Applications, 2006:1025 - 1036.
  • 2曹玥,李晖,吕东亚.基于DDoS的TCP SYN攻击与防范[J].电子科技,2004,17(2):19-23. 被引量:6
  • 3Chen S, Tang Y. Stateful DDoS Attacks and Targeted Fihering[J ]. Journal of Network and Computer Applications ,2007,30(3 ).
  • 4蔡玮珺,黄皓.DDoS攻击IP追踪及攻击源定位技术研究[J].计算机工程,2006,32(14):151-153. 被引量:6
  • 5Minho Sung, Jun Xu. IP traceback - based intelligent packet filtering: a novel technique for defending against internetDDoS attacks[ C]. 10 th IEEE International Conference on Network Protocols ( ICNP ), Paris, France, 2002.

二级参考文献7

  • 1Manhee Lee,Eun Jung Kim,Cheol Won Lee.A Source Identification Scheme Against DDoS Attacks in Cluster Interconnects[C].Proc.of ICPP Workshops,2004-08.
  • 2Savage,Etherall D,Karlin A,et al.Network Support for IP Traceback[J].IEEE/ACM Transactions on Networking,2001,9(3).
  • 3Dean D,Franklin M,Stubblefield A.An Algebraic Approach to IP Traceback[C].Proc.of 2001 Network and Distributed System Security Symp.,2001-02.
  • 4Mankin A,Massey D,Chie Lung Wu,et al.On Design and Evaluation of "Intention-driven ICMP Traceback"[C].Proc.of IEEE Int.Conf.on Computer Communications and Networks,2001
  • 5Ho-Yen Chang.On Real-time Intrusion Detection and Source Identification[D].Department of Electronic Engineering,NC State University,2000.
  • 6Burch H,Cheswisk B.Tracing Anonymous Packets to Their Approximate Source[C].Proc.of 2000 USENIX LISA Conf.,2000-12.
  • 7董玲,陈一民,朱正江.DoS攻击的研究与源地址追踪[J].计算机工程与科学,2004,26(3):18-20. 被引量:4

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部