期刊文献+

基于流量与可用资源的DDoS检测系统研究

On Traffic and Available Resources Based DDoS Detection
下载PDF
导出
摘要 近年来随着互联网技术的大规模社会化应用,网络安全也越来越受到关注。作为一种严重的网络威胁,分布式拒绝服务(DDoS)攻击一直为人们所关注。通过流量分析与可用资源检测的双层判别,对DDoS进行有效检测,将实现对DDoS检测的多元化。 In recent years,with a large-scale application of Internet,the relationship between daily life and network is becoming closer and closer.Network security has been the focus of research.As a serious threat,Distributed Denial of Service(DDoS) has already been a concern.An approach that analyses traffic and available resources will be effective in detecting DDoS.And it will be a complement of DDoS detection.
作者 郑明明 梁鸿
出处 《常州工学院学报》 2010年第6期48-51,共4页 Journal of Changzhou Institute of Technology
关键词 分布式拒绝服务 流量分析 可用资源检测 DDoS traffic available resources
  • 相关文献

参考文献13

  • 1国家互联网应急中心.中国互联网网络安全报告(2010年上半年)[R],2010.
  • 2孙知信,姜举良,焦琳.DDOS攻击检测和防御模型[J].软件学报,2007,18(9):2245-2258. 被引量:34
  • 3Takuo Nakashima,Shunsuke Oshima.A Detective Method for SYN Flood Attacks[C]//First International Conference on Innovative Computing,Information and Control-Volume(ICICIC′06),IEEE Computer Society,2006:48-51.
  • 4John Elliott.Distributed Denial of Service Attacks and the Zombie Ant Effect[J].IT Prfessional,2000,2(2):55-57.
  • 5Glenn Carl,George Kesidis,Richard R Brooks,et al.Denial-of-Service Attack-Detection Techniques[J].IEEE Internet Computing,2006,10(1):82-89.
  • 6Sanjeev Kumar.Smurf-based Distributed Denial of Service(DDoS) Attack Amplification in Internet[C]//Second International Conference on Internet Monitoring and Protection(ICIMP 2007),IEEE Computer Society,2007.
  • 7曹爱娟,刘宝旭,许榕生.抵御DDoS攻击的陷阱系统[J].计算机工程,2004,30(1):10-13. 被引量:14
  • 8Mohamed Hamdi,Noureddine Boudriga.Detecting Denial-of-Service Attacks Using the Wavelet Transform[J].Computer Communications,2007,30(16):3203-3213.
  • 9Lee Garber.Denial-of-Service Attacks Rip the Internet[J].Computer,2000,33(4):12-17.
  • 10Christos Douligeris,Aikaterini Mitrokotsa.DDoS Attacks and Defense Mechanisms:Classification and State-of-the-art[J].Computer Networks,2004,44(5):643-666.

二级参考文献16

  • 1孙知信,唐益慰,程媛.基于改进CUSUM算法的路由器异常流量检测[J].软件学报,2005,16(12):2117-2123. 被引量:27
  • 2孙知信,唐益慰,张伟,宫婧,王汝传.基于特征聚类的路由器异常流量过滤算法[J].软件学报,2006,17(2):295-304. 被引量:15
  • 3[1]Harrison A. The Denial-of-service Attack Aftermath. http://www.cnn. com/2000/TECH/computing /02/14/dos.aftermath.idg, 2000
  • 4[2]Power R. 2001 CSI/FBI Computer Crime and Security Survey. Technical Report, Computer Security Institute, 2001
  • 5[3]Stein L D, Stewart J N. The World Wide Web Security FAQ-Version 3.1.2. http://www.w3.org/Security/Faq/, 2002-02
  • 6[4]Paxson V. An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks. Computer Communication Review, 2001,31(3)
  • 7[5]Cisco Systems, Inc. Cisco Security Advisory: 7xx Router Password Buffer Overflow. http://www.cisco.com/warp/public/770/pwbuf-pub. shtml, 1998-07
  • 8[6]Huegen C A. The Latest in Denial of Service Attacks: Smurfing Des- cription and Information to Minimize Effects. White Paper, 2000-02
  • 9[7]CERT Coordination Center. CA-1999-17: Denial of Service Tools.http: //www.cert.org/advisories/CA-2000-01.html.
  • 10[8]Cisco Systems Inc.. Defining Strategies to Protect Against TCP SYN Denial of Service Attacks. Http://www.cisco.com/warp/public/707/4. Html, 1999-07

共引文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部