期刊文献+

基于自相似流量检测的DDoS攻击及防御研究 被引量:6

Research on DDoS Attack and Defense based on Network Selfsimilarity Detecting
下载PDF
导出
摘要 DDoS攻击是目前互联网中应用最广泛,也是危害性最大的一种攻击方式,以破坏网络服务的可用性为目标。文章首先介绍了DDoS的攻击原理,并重点对DDoS的攻击方式和基于自相似网络流量的DDoS攻击检测方式进行研究,最后针对目前DDoS攻击的防御方式进行了全面解析。 DDoS attack is a widely-used and most dangerous attack mode of Internet. It takes availability of network service as the target. This paper introduces the principle of DDoS attack, and focus on methods of network self-similarity in detecting DDoS Attack. Finally, the methods of DDoS attack are analyzed comprehensively.
出处 《信息网络安全》 2014年第9期69-71,共3页 Netinfo Security
关键词 分布式攻击 防御措施 DDoS DDoS distributed attack defense method
  • 相关文献

参考文献6

  • 1李蓬.DDoS攻击原理及其防御机制的研究[J].通信技术,2010,43(4):96-98. 被引量:11
  • 2Leland W E, Taqqu M S, Willingerw, et al. OntheSelf—similar Natureof Ethernet Traffic[J]. IEEETrans on Networking, 1994,2(01):1- 15.
  • 3冯江.DDoS攻击的检测与防御研究[D].无锡:江南大学,2009.
  • 4Weiler N. Honeypots for Distributed Denial of Service Attacks[C].In:Proceedings of IEEE WET ICE Workshop on Enterprise Security2002,Pitsburgh,USA,2002-06 pp:109-114.
  • 5百度百科.蜜躍技术[EB/OL].http://baike.baidu.com/view/1253064.htm, 2014—05—11.
  • 6池水明,周苏杭.DDoS攻击防御技术研究[J].信息网络安全,2012(5):27-31. 被引量:48

二级参考文献11

  • 1盖凌云,黄树来.分布式拒绝服务攻击及防御机制研究[J].通信技术,2007,40(6):40-41. 被引量:6
  • 2Dietrich S,Long N,Dittrich D.Analyzing Distributed Denial of Service Attack Tools:The Shaft Case[C].In:14th Systems Administration Conference.CA.USA:USENIX Association Berkeley,2000:329-340.
  • 3Lee R B.CE-L2003-003,Taxonomies of Distributed Denial of Service Networks.Attacks,Tools and Countermeasures[B].New Jersey:Department of Electrical Engineering,Princeton University,2003.
  • 4Barford P,Kline J,Plonka D.A Signal Analysis of Network Traffic Anomalies[C]// Proceedings of ACM SIGCOMM Internet Measurement Workshop.NY,USA:ACM,2002:71-82.
  • 5Park K,Lee H.On the Effectiveness of Route-based Packet Filtering for Distributed DoS Attack Prevention in Power-law Internets[C]//Proceedings of ACM SIGCOMM.NY,USA:ACM,2001:15-26.
  • 6百度百科.DDoS[EB/OL].http://baike.baidu.com/view/23271.htm,2012-03-03.
  • 7HARVERD.Distributed Denial of Service Attacks Against Independent Media and Human Rights Sites[D]. The Berkman Center for Intemet & Society at Harvard University. December 2010. Archived from the original on 2011-05-01. Retrieved 2011.
  • 8Harvard. DDoS Public Media Reports[D].Archived from the original on 2011-05-01.
  • 9百度. RFC 4987-TCP SYN Flooding Attacks and Common Mitigations[EB/OL]. http:/ /www.baidu,com/s?bs=Distributed+ Denial +of+ Service+ Attacks+ Against + Independent + Media +and +Human+Ri&f=8&rsv_bp= 1&rsv_spt=3&wd=RFC+4987+- Flooding+Attacks+and+Common+Mitigations&rsv n=2&inputT=578, 2012-03-03.
  • 10MADS. How To: Harden the TCP/IP Stack[EB/OL].http://msdn. microsoft.com/en-us/library/ff648853.aspx, 2012-03-03.

共引文献55

同被引文献86

引证文献6

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部