期刊文献+

浅析DDoS攻击与防范

下载PDF
导出
摘要 通过对DDoS攻击原理的讨论和常见DDoS攻击实施的研究,提出了DDoS攻击检测与防范的几种方法。旨在提供DDoS攻击检测与防范思路,并指导信息安全工程师针对DDoS攻击进行安全加固。
作者 张晓溪
机构地区 山东省计算中心
出处 《警察技术》 2014年第B06期17-22,共6页 Police Technology
  • 相关文献

参考文献2

二级参考文献14

  • 1Tripwire. Tripwire for servers [R/OL]. http:∥www. tripwire.com/products/servers/.
  • 2David Moore, Ram Periakaruppan, Jim Dono-hoe, et al.Where in the world is net-geo.caida.org? [C]. INET 2000Proceedings, 2000.
  • 3CERT Coordination Center. Trends in denial of service attacktechnology[R/OL]. 2001.
  • 4Jelena Mirkovic, Janice Martin, Peter Reiher. A taxonomy of DDoS attacks and DDoS defense mechanisms[R]. Computer Science Department University of California, Los Angeles Technical Report #020018,2001.
  • 5王国伟. 网络安全分布式 DDOS 攻击 [N/OL]. http:∥it.rising.com.cn/.
  • 6Howard J D, Longstaff T A. A common language for computer security incidents [R/OL]. Sandia Report: SAND 98-8667, Sandia National Laboratories, http:∥www. cert.org/research/taxonomy_988667.pdf.
  • 7Axelsson S. Intrusion detection systems: A survey and taxonomy [R/OL]. Technical Report 99-15, Department of Computer Engineering, Chalmers University, 2000.
  • 8Debar H, Dacier M, Wespi A. Towards a taxonomy of intrusion-detection systems[J]. Computer Networks, 1999,31(8):805-822.
  • 9Hafner K, Markoff J. Cyberpunk: Outlaws and hackers on the computer frontier[M]. Simon & Schuster, 1991.21-140.
  • 10Bellovin S, LeechM, TaylorT. ICMPtracebackmessages[R/OL]. 2001. Internet draft, Work in progress. http:∥search.ietf. org/internet-drafts/draft-ietf-itrace-01.txt.

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部