期刊文献+

Web应用防火墙中DDoS防范的设计与实现 被引量:2

Design and Implementation of DDoS Defence in WAF
下载PDF
导出
摘要 分析DDoS攻击的形成及特征,对各种拒绝服务攻击的实现算法进行对比分析。重点研究可用于检测和防御基于HTTP协议的DDoS攻击的方法,消除或者减少HTTP-Flood攻击对Web服务器的影响,从而达到保护Web服务器的目的。最后,将这种检测防御方法移植到Web应用防火墙(WAF)的DDoS模块中,实现Web服务器防范DDoS攻击的最终解决方案。 The paper analyzes formation and features of DDoS attacks, compares the algorithms of refusal service attacks. It focus- es on a method used to detect and defense HTFP protocol-based DDoS attack, to eliminate or reduce the impact of HTYP-Flood attack on web server, so as to protect web server. Then this method is applied in DDoS module of web application firewall (WAF) to get the solution on web server defensing DDoS attack.
作者 刘志光
出处 《情报探索》 2014年第8期69-73,共5页 Information Research
关键词 DDOS攻击 WEB应用 HTTP协议 平稳背景流 突发背景流 DDoS attack web application HTYP protocol smooth background traffic bursty background traffic
  • 相关文献

参考文献4

二级参考文献33

  • 1李文中,郭胜,许平,陆桑璐,陈道蓄.服务组合中一种自适应的负载均衡算法[J].软件学报,2006,17(5):1068-1077. 被引量:41
  • 2吴庆涛,张有根,邵志清.基于网络连接统计的分布式拒绝服务攻击检测[J].华东理工大学学报(自然科学版),2006,32(5):583-586. 被引量:4
  • 3林梅琴,李志蜀,袁小铃,周密,王雪松,童铭.分布式拒绝服务攻击及防范研究[J].计算机应用研究,2006,23(8):136-138. 被引量:11
  • 4Ismail Ari,Bo Hong,Ethan L,et al.Modeling,analysis and simulation of flash crowds on the Internet.Technical Report UCSC-CRL-03-15.Storage Systems Research Center,Jack Baskin School of Engineering University of California,Santa Cruz,CA,Feb 2004
  • 5JungJ,Krishnamurthy B,Rabinovich M.Flash crowds and denial of service attacks:characterization and implications for CDNs and Web sites.In:Proceeding of the 11th IEEE Intemational World Wide Web Conference,Honolulu,Hawaii,May 2002
  • 6Michael Walfish,Mythili Vutukuru,Hari Balakrishnan,et al.DDoS defense by offense.In:Proceedings of SIGCOMM'06,Pisa,Italy,Sept 2006
  • 7Jin Cao,Cleveland W S,Yuan Gao,et al.Stochastic models for generating synthetic HTTP source traffic.In:Proceedings of IEEE INFOCOM,Hong Kong,China,March 2004
  • 8Lee Breslau,Pei Cao,Li Fan,et al.Web caching and Zipf-like distributions:evidence and implications.In:Proceeding of the IEEE INFOCOM'99,Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies,New York,NY,USA,March 1999
  • 9Christos Douligeris,Aikaterini Mitrokotsa.DDoS attacks and defense mechanisms:classification and state-of-the-art.Computer Networks,2004,44(5):643~666
  • 10Cabrera J B D,Lewis L,Qin X,et al.Proactive detection of distributed denial of service attacks using MIB traffic variables a feasibility study.In:Proceeding of the IEEE/IFIP International Symposium on Integrated Network Management,Seattle,WA,USA,May 2001

共引文献20

同被引文献19

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部