期刊文献+

防DoS攻击算法的分析和实现 被引量:4

Analysis and Realization of Anti-DoS Attack Algorithm
下载PDF
导出
摘要 网络安全是Internet发展的一大难题,随着网络攻击活动的猖獗和Internet的普及而显得越来越重要。主要分析了一种网络攻击(DoS攻击)的原理,讲述了几种具体的攻击方法,并在此基础上给出了防DoS攻击的一种算法。 During the development of Internet, network security is a difficult problem. By more and more network attack activity and prevalence of Internet, it becomes more and more important. In this article we mainly analyze the theory of a kind of network attacks, Deny of Service attack, narrate a few attack ways, and give an algorithm of antiDoS attack.
出处 《计算机应用》 CSCD 北大核心 2003年第6期90-91,共2页 journal of Computer Applications
关键词 DOS攻击 DDOS攻击 ICMP RIP 算法实现 DoS attack DDoS attack ICMP RIP
  • 相关文献

参考文献9

  • 1钱红燕,周军.TCP/IP网络的DDoS攻击及对策[J].南京航空航天大学学报,2000,32(6):701-705. 被引量:13
  • 2黎宙,梁华金.UDP和ICMP洪流攻击问题的分析[J].现代计算机,2001,7(3):56-59. 被引量:4
  • 3范明钰,王光卫.一种DDOS攻击分析[J].通信技术,2001,34(5):56-59. 被引量:3
  • 4Comer DE. Internetworking with TCP/IP VOLUME I Principles,Protocols and Architecture[M]. Prentice Hall, 1995.
  • 5Hedrick C. Routing information protocol[S]. RFC 1058, 1988.
  • 6Postel J. Internet control message protocol[S]. RFC 792, September 1981.
  • 7Hare C, Siyan K. Intemet firewalls and networks security[M]. New Riders Publishing, 1998.
  • 8Wright R. IP Routing Primer[M]. Cisco Press, 1998.
  • 9Tanenbaum AS. Computer Networks(third edition)[M]. Prentice- Hall, 1996.

二级参考文献17

  • 1谢希仁.计算机网络(第二版)[M].辽宁:大连理工大学出版社,1997..
  • 2[1]Bellovin S M. Security problems in the TCP/IP protocol suite. Computer Communication Review, 1989,19(2):32~48
  • 3[2]Tanenbaum A S. Computer networks (3rd edition). Prentic-Hall International, Inc, 1996.396~448
  • 4[3]Hedrick C. Routing information protocol. RFC 1058, 1988.5~31
  • 5[4]Postel J. Internet control message protocol. RFC 792,1981.2~18
  • 6[5]Rekhter Y, Moskowitz G R, Karrenberg D,et al. Address allocation for privarc internets.RFC 1918,1996.1~7
  • 7[6]Ferguson P, Senie D. Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. RFC 2267,1998.2~10
  • 8[7]Hare C, Siyan K. Internet firewalls and networks security (2nd edition). New Riders Publishing, 1998.122~178
  • 9[1]CERT DSI Tools Workshop Report. http://www. cert. org/reports/dist_workshop. pdf
  • 10[2]CERT Advisory DOS Tools. http://www. cert. org/advisories/CA -99- 17 - denial - of - service - tools. html

共引文献13

同被引文献19

  • 1蔡敏,叶震,徐吉斌.协议分析技术在入侵检测中的应用[J].计算机技术与发展,2007,17(2):239-241. 被引量:10
  • 2Wright G R,Stevens W R. TCP/IP 详解卷2:实现[M].陆雪莹等译.北京:机械工业出版社,2000.
  • 3寺田真後,萱岛信.TCP/IP网络安全篇[M].王庆译.北京:科学出版社,2003.
  • 4Peter Mell, Donald Marks, Mark McLarnon. A denial - of - service resistant intrusion detection architecture[J]. Computer networks,2001,34(4): 641 - 658.
  • 5Comer DE. Interetworking with TCP/IP volume I priciples, protocols, and architecture[M]. Third Edition. Prentice Hall, 1995.
  • 6胡道元.网络设计师[M].北京:清华大学出版社,2001,5..
  • 7KarenWebb.组建Cicso多层交换网络[M].北京:人民邮电出版社,2000,10..
  • 8CatherinePaquet DianeTeare.组建可扩展的Cisco网络[M].北京:人民邮电出版社,2001,3..
  • 9钱红燕,周军.TCP/IP网络的DDoS攻击及对策[J].南京航空航天大学学报,2000,32(6):701-705. 被引量:13
  • 10黎宙,梁华金.UDP和ICMP洪流攻击问题的分析[J].现代计算机,2001,7(3):56-59. 被引量:4

引证文献4

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部