期刊文献+

浅析分布式拒绝服务的攻击和预防

The Brief Analysis Distributional Rejects the Attack and the Prevention which Serves
下载PDF
导出
摘要 该文分析了分布式拒绝服务的来由、DDOS的攻击方式和被DDOS攻击的现象,讨论了预防方法与措施,以及预防的困难程度。 This article has analyzed the reason,the DDOS forms of defensive action and by the DDOS attack phenomenon which distributional refuses to serve,discussed the prevention method and the measure,as well as prevention difficult degree.
作者 王恒青 宋如敏 WANG Heng-qing1,SONG Ru-min2 (1.Xuzhou Electromedchanical Engineering Department of Jiangsu United Vocational College,Xuzhou 221011,China;2.Xuzhou Bioengineering Polytechnic College,Xuzhou 221006,China)
出处 《电脑知识与技术(过刊)》 2010年第30期8504-8505,共2页 Computer Knowledge and Technology
关键词 分布式拒绝服务 攻击方式 预防措施 distributional refuses to serve forms of defensive action preventive measure
  • 相关文献

参考文献5

二级参考文献33

  • 1孙知信,李清东.路由器端防范DDos攻击机制综述[J].南京邮电大学学报(自然科学版),2007,27(1):89-96. 被引量:8
  • 2John Howard.An Analysis of Security Incidents on the Intemet[D].Ph D thesis.Carnegie Mellon University,1998.
  • 3Lee Garber.Denial-of-Service Attacks Rip the Intemet[J].IEEE Computer, 2000-04.
  • 4P Ferguson,D Senie.Network Ingress Filtering:Defeating Denial of Service Attacks Which Employ IP Source Spoofing[S].RFC2827,2001.
  • 5Ratul Mahajan,Steven M Bellovin,Sally Floyd et al.Controlling High Bandwidth Aggregates in the Network.2001-02.
  • 6R Stone.CenterTrack:An IP overlay network for tracking DoS Hoods [C].In:Proc 2000 USENIX Security Syrnp,2000.
  • 7H Burch,B Cheswich.Tracing Anonymous Packets to Their Approximate Source[C].In:Proc 2000 USENIX LISA Conf,2000.
  • 8I Postel.Intemet Protocol[S].RFC791,1981.
  • 9Stefan Savage,David Wetherall,Anna Karlin et al.Network Support for IP Traceback[J].IEEE/ACM Transaction on Network,2001-06.
  • 10I Stoiea,H Zhang.Providing Guaranteed Services Without Per Flow Management[C].In:Proceedings of the 1999 ACM SIGCOMM Conference, 1999-08.

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部