期刊文献+

DDoS客服协同防御机制研究 被引量:2

DDoS defense scheme using collaboration of client and servers
下载PDF
导出
摘要 为了抵御分布式拒绝服务攻击(DDoS),文章提出了从傀儡机和服务器端进行协同防御的机制,对于面向无连接的攻击,主要在傀儡机端进行主动检测防御,对于面向连接的攻击,采用客服协同的SYN Cookie技术,从而主动有效地防御攻击DDoS;仿真测试结果验证了该机制的有效性。 To defend against the distributed denial of service(DDoS) attack, a special DDoS defense scheme using the collaboration of puppet machine and servers is proposed. For the connectionless oriented attack, the active detection and defense is mainly conducted on puppet-side. For the connection oriented attack, the technology of SYN Cookie using the collaboration of client and servers is applied. So it can defend against the DDoS attack effectively and initiatively. Simulation results validate the ef- fectiveness of the said scheme.
作者 黄强 叶震
出处 《合肥工业大学学报(自然科学版)》 CAS CSCD 北大核心 2011年第11期1678-1681,1700,共5页 Journal of Hefei University of Technology:Natural Science
关键词 傀儡机 防御 客服协同 puppet machine defense collaboration of client and servers
  • 相关文献

参考文献10

二级参考文献48

  • 1刘凤,郝桂英,李志勇.基于SYN漏洞的DDoS攻击防御算法实现[J].微计算机信息,2006,22(08X):70-72. 被引量:2
  • 2SkoudisEd.反击黑客[M].北京:机械工业出版社,2002..
  • 3Peng T, Leckie C, Ramamohanarao K. Survey of network- based defense mechanisms countering the DoS and DDoS problems[J]. ACM Compute, 2007,39 (1).
  • 4Park K, Lee H. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack[C]//Proeeedings of IEEE INFOCOM, 2001 : 338-347.
  • 5Li J, Mirkovic J, Wang M, et al. Save: source address validity enforcement protocol[C]//Proeeedings of IEEE INFOCOM, 2002 : 1557-1566.
  • 6Wang H, Zhang D, Shin K G. Detecting SYN flooding attacks [C]//Proceedings of IEEE INFOCOM, 2002: 1530-1539.
  • 7Forrect S, Hofmeyr S. Architecture for an artificial immune system[J]. Evolution Computat,1999, 7(1):45-68.
  • 8Burch H,Cheswuick B. Tracing anonymous packets to their approximate source[C]//Proceedings of the 14th Systems Administration Conference, New Orleans, LA, 2000: 319-327.
  • 9Peng T, Leckie C, Ramamohanarao K. Adjusted probabilistic packet marking for IP traceback[C]//Proceedings of the Second IFIP Networking Conference,2002:697 708.
  • 10Snoeren A C, Partridge C, Sanchez L A, et al. Hash-based IP traceback [C]//Proceedings of the 2001 ACM SIG- COMM Conference, San Diego, CA, 2001 : 3-14.

共引文献83

同被引文献21

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部