期刊文献+

云计算下DDoS攻击检测分析

原文传递
导出
摘要 0引言第三次科技革命以来,互联网的发展早已成为了大势所趋。随着网络技术的不断发展,网络安全问题也已经成为了整个人类社会的突出问题。DDoS作为《中国互联网网络安全报告》当中关于网络攻击的四大主要攻击事件之一,由于其防御较难、隐蔽性强等特点,也日益引起了人们的重视。而在云计算不断发展和普及之后,DDoS攻击在之前的基础之上,又具有了新的特性,
作者 谭昕
出处 《网络安全技术与应用》 2016年第4期65-66,共2页 Network Security Technology & Application
  • 相关文献

参考文献3

二级参考文献29

  • 1MEHTA M,THAPAR K,OIKONOMOU G,et al.Combining speak-up with DefCOM for improved DDoS defense[C] // IEEE International Conference on Communications.New York:IEEE,2008:1708-1714.
  • 2SUN HUIZHONG,ZHAUNG Y,CHAO J H.A principal components analysis-based robust DDoS defense system[C] // IEEE International Conference on Communications,New York:IEEE,2008:1663-1669.
  • 3SUL W T,LIN T C,WU C Y,et al.An on-line DDoS attack traceback and mitigation system based on network performance monitoring[C] // Proceedings of 10th International Conference on Advanced Communication Technology.New York:IEEE,2008:1467-1472.
  • 4CHEN YU,HWANG K,KU W S.Collaborative detection of DDoS attacks over multiple network domains[J].IEEE Transactions on Parallel and Distributed Systems,2007,18(12):1649-1662.
  • 5KHOR S N.Overfort:Combating DDoS with peer-to-peer DDoS puzzle[C] // IEEE International Symposium on Parallel and Distributed Processing.New York:IEEE,2008:1-8.
  • 6KUMAR K,JOSHI R C,SINGH K.A distributed approach using entropy to detect DDoS attack[C] // International Conference on Communications and Networking.New York:IEEE,2007:331-337.
  • 7SARDANA A,JOSHI R C,KIM T H.Deciding optimal entropic thresholds to calibrate the detection mechanism for variable rate DDoS attacks in ISP domain[C] // Proceedings of the 2008 International Conference on Information Security and Assurance.Washington,DC:IEEE Computer Society,2008:270-275.
  • 8YU SHUI,ZHOU WANLEI.Entropy-based collaborative detection of DDoS attacks on community networks[C] // Proceedings of the 2008 6th Annual IEEE International Conference on Pervasive Computing and Communications.Washington,DC:IEEE Computer Society,2008:566-571.
  • 9YU SHUI,ZHOU WANLEI.Information theory based detection against network behavior mimicking DDoS attacks[J].Communications Letters,2008,12(4):318-321.
  • 10SARDANA A,KUMAR K,JOSHI R C.Detection and honeypot based redirection to counter DDoS attacks in ISP domain[C] // Proceedings of 3rd International Symposium on Information Assurance and Security.Washington,DC:IEEE Computer Society,2007:191-196.

共引文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部