期刊文献+

Principles of Network Security Protocols Based on Dynamic Address Space Randomization 被引量:1

Principles of Network Security Protocols Based on Dynamic Address Space Randomization
下载PDF
导出
出处 《通讯和计算机(中英文版)》 2016年第2期77-89,共13页 Journal of Communication and Computer
关键词 网络安全协议 地址空间 随机化 网络安全解决方案 原理 软件解决方案 网络节点 网络地址 Network security, Intemet of Things, DDoS (distributed denial of service), network protocols, IP Fast Hopping
  • 相关文献

参考文献17

  • 1Blessy, R., and Deepa, A. J. 2015. "A Survey on Network Security Attacks and Prevention Mechanism." Journal of Current Computer Science and Technology 5 (2): 1-5.
  • 2Zargar, S. T., Joshi, J., and Tipper, D. 2013. "A Survey of Defense Mechanisms against Distributed Denial of Service (DDoS) Flooding Attacks." IEEE Communications Surveys & Tutorials 15 (4): 2046-69.
  • 3Prasad, K. M., Reddy, A. R. M., and Rao, K. V. 2014. "DOS and DDoS Attacks: Defense, Detection and Traceback Mechanisms--A Survey." Global Journal of Computer Science and Technology 14 (7): 15-32.
  • 4Gupta, B. B., Joshi, R. C., and Misra, M. 2010. "Distributed Denial of Service Prevention Techniques." International Journal of Computer and Electrical Engineering 2 (2): 268-76.
  • 5Ankita, P., and Khatiwala, F. 2015. "Survey on DDoS Attack Detection and Prevention in Cloud." International Journal of Engineering Technology, Management and Applied Sciences 3 (2): 43-7.
  • 6Krylov, V., and Kravtsov, K. 2014. "IP Fast Hopping Protocol Design." In Proceedings of the lOth Central and Eastern European Software Engineering Conference in Russia, Moscow.
  • 7Krylov, V., and Kravtsov, K. 2014. "DDoS Attack and Interception Resistance IP Fast Hopping Based Protocol." Presented at the 23rd International Conference on Software Engineering and Data Engineering, SEDE 2014, New Orleans.
  • 8Mittal, P., Kim, D., Hu, Y. C., and Caesar, M. 2012. "Mirage: Towards Deployable DDoS Defense for Web Applications." arXiv.
  • 9Antonatos, S., Akritidis, P., Markatos, E. P., and Anagnostakis, K. G. 2005. "Defending against Hittist Worms Using Network Address Space Randomization." In Proceedings of the 2005 ACM Workshop on Rapid Malcode, Fairfax, VA, USA.
  • 10Lake, D., Rayes, A., and Morrow, M. 2012. "The Internet of Things." The lnternet Protocol Journal 15 (3): 10-9.

同被引文献22

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部