期刊文献+

SYN flood攻击检测技术综述

Overview of SYN flood attack detection techniques
下载PDF
导出
摘要 分析SYN flood attack攻击原理,并在此基础上研究几种典型的SYN flood攻击检测方法。对主要技术进行分析和比较,这些技术均有各自的优点和局限性,多种方法有机融合互补将成为SYN flood攻击检测研究的重点。 This paper analyses the principle of SYN flood attack,and some typical detecting methods are researched based on it.This paper summarizes and analyzes each of these schemes.These schemes have their own advantages and limitations,so organically combining several methods will be the focus of detecting SYN flood attack.
作者 石利平
出处 《微型机与应用》 2011年第14期48-50,53,共4页 Microcomputer & Its Applications
关键词 SYN FLOOD攻击 TCP协议 检测 SYN flood attack TCP protocol Detect
  • 相关文献

参考文献10

二级参考文献36

  • 1任勋益,王汝传,王海艳.基于自相似检测DDoS攻击的小波分析方法[J].通信学报,2006,27(5):6-11. 被引量:56
  • 2Wright G.StevensR.TCP/IP详解:实现[M].北京:机械工业出版社,2000.
  • 3Crovella M E, Bestavros A. Explaining World Wide Web Traffic Self-Similarity[R]. Boston University, Technical Report: TR-95-015, 1995.
  • 4Shin Seung-won, Kim Ri-young, Jang Jong-song. Analysis of TCP SYN Traffic: An Empirical Study[J]. IEEE Trans. on Information Theory, 2006, 45(8): 54-63.
  • 5Wang Yining, Zhang Danfu, Shin Kang. Detecting SYN Flooding Attacks[C]//Proc. of the 2nd ACM Conference on Sequence and Their Applications. [S.l.]: ACM Press, 2002: 83-92.
  • 6Hunter E Distributed Intrusion Detection System Can Make Security More Adaptive[J]. IEEE Trans. on Information Theory, 2003, 48(11): 124-129.
  • 7Cheng Chenmou, Tan Koansin. Use of Spectral Analysis in Defense Against DoS Attacks[J]. IEEE Trans. on Information Theory, 2002, 42(2): 1246-1257.
  • 8Barford P, Kline J, Plonka D, et al. A Signal Analysis of Network Traffic Anomalies[J]. IEEE Trans. on Information Theory, 2002, 51(3): 81-93.
  • 9Zhang Zhili, Ribeiro V, Sue Mei, et al. Small-time Scaling Behaviors Internet Backbone Traffic: an Empirical Study[J]. IEEE Trans. on Information Theory, 2003, 25( 14): 2368-2398.
  • 10Craig P, Cousins D, Jackson A W, et al. Using Signal Processing to Analyze Wireless Data Traffic[J]. ACM Workshop on Wireless Security, 2002, 4(12): 8-16.

共引文献51

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部