期刊文献+

一种主动防御UDP Flood攻击的机制 被引量:1

An active defense mechanism of UDP Flood attack
原文传递
导出
摘要 在传统防御UDPFlood攻击的基础上研究新的处理过程,提出了一种主动防御UDPFlood攻击的机制.该机制主要通过攻击防御前的数据包特征检查及未验证表和已验证表的调用进行攻击防御.测试表明,该机制能在保证正常网络通信情况下,实现对攻击包的拦截,有效防御UDPFlood攻击. Researchs new treating processes deeply based on those tradional ways of defense UDP Flood,proposes an active defense mechanism of UDP Flood attack. This mechanism uses data program characteristic checking and pre-confirmation and confirmation tables to defend UDP Flood attack. Throught a test,it proves this mechanism can defend UDP Flood attack validitily on condition of guaranteeing the proper network correspondence.
出处 《福州大学学报(自然科学版)》 CAS CSCD 北大核心 2010年第2期198-201,共4页 Journal of Fuzhou University(Natural Science Edition)
基金 福建省教育厅科研资助项目(JB09007) 福州大学科技发展基金资助项目(2008-XY-15)
关键词 主动防御 UDP FLOOD攻击 特征检查 验证表 active defense UDP Flood attack characteritic checking confirmation table
  • 相关文献

参考文献8

二级参考文献41

共引文献61

同被引文献10

  • 1Sabahi F, Movaghar A. Intrusion detection: A survey [C]. Proceedings of the 3rd International Conference on Systems and Networks Communication. Sliema, Malta: IEEE, 2008:23-26.
  • 2Hemant G, Albert G G, David A M, et al. MMS: An auto- nomic network-layer {oundation for network management [J]. IEEE Journal on Selected Areas in Communication, 2010, 28 (1) : 15-27.
  • 3Cavusoglu H, Mishra B, Raghunathan S. The value of intrusion detection systems in information technology security architecture [J]. Information Systems Research, 2005, 16 (1):28-46.
  • 4SONG T, ZHANG W, WANG D, et al. A memory efficient multiple pattern matching architecture for network security [C]. Proceedings of the 27th IEEE Communications Society Conference on Computer Communications. Phoenix, AZ: IEEE, 2008:673-681.
  • 5ZHANG Y, DENG F, CHEN Z, et al. UTM-CM: A practical control mechanism solution for UTM system [C]. Proceedings of the WRI International Conference on Communications and Mobile Computing, 2010: 86-90.
  • 6Fulp E W, Farley R J. A function-parallel architecture for high- speed firewalls [C]. Proceedings of the IEEE International Conference on Communications. Istanbul, Turkey, IEEE, 2006: 2213-2218.
  • 7Nick S, Daniel S, Alison J S, et al. A standard lexicon for biodiversity conservation: unified classifications of threats and actions[J]. Conservation Biology, 2008, 22 (4): 897-911.
  • 8Young U Ryu, Hyeun-suk Rhee. Evaluation of intrusion detection systems under a resource constraint [J]. ACM Transaction on In- formation and System Security, 2008, 11 (4): 1-24.
  • 9任高明,乔向东,杨仝,白军亮.对WehnTrust入侵防御功能的测试与分析[J].计算机工程与设计,2011,32(9):2921-2924. 被引量:1
  • 10章坚武,颜欢,包建荣.智能家庭网关设计及其物联网应用[J].计算机工程,2011,37(18):246-248. 被引量:13

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部