期刊文献+

DDoS攻击及其防范策略 被引量:3

DDoS Attack and Its Defence Tactics
下载PDF
导出
摘要 比较Dos与DDos的概念,引入DDos攻击的原理,介绍了DDos攻击的常用工具,提出针对DDos攻击的对策,包括DDos攻击的监测、防御DDos攻击以及遭受DDos攻击后的处理等,经过小型网站运行经验的验证,文中提出的攻击对策和防范策略是极其有效的。 Compares the concept of Dos attack and DDos attack,describes the principles of DDos, introduces the ordinary tools of the DDos attack, and puts forward the countermeasures of DDos attack in detail,including explaining how to inspect and defend DDos attack and the implementations after suffered from DDos attack are also pointed out. The measures of how to inspect and defend DDos attack and the implementations after suffered from DDos attack are proved to be useful and necessary after the validation in some small websites for several months.
出处 《微机发展》 2003年第9期46-48,56,共4页 Microcomputer Development
关键词 计算机网络 网络攻击 网络安全 DDOS 防范策略 防火墙 DDoS TCP/IP network security
  • 相关文献

参考文献9

  • 1刘芳,陈泰伟,戴葵.分布式拒绝服务攻击预警系统的设计与实现[J].计算机工程,2001,27(5):129-130. 被引量:10
  • 2陈科,李之棠.网络入侵检测系统和防火墙集成的框架模型[J].计算机工程与科学,2001,23(2):26-28. 被引量:44
  • 3钱红燕,周军.TCP/IP网络的DDoS攻击及对策[J].南京航空航天大学学报,2000,32(6):701-705. 被引量:13
  • 4张海航.黑客常用攻击方式之DDoS攻击全面剖析[EB/OL].http://www.rising.com.cn,2002.
  • 5薛华.设置路由器门限值预防DDoS攻击[EB/OL].http://www2.ccw.com.cn,2002.
  • 6BrentonC.网络安全积极防御从入门到精通[M].北京:电子工业出版社,2001..
  • 7Brenton C.网络安全积极防御从入门到精通[M].北京:电子工业出版社,2001..
  • 8Song D X, Perrig A. Advanced and Authenticated Marking Schemes for IP Traceback[EB/OL].http:citeseer.nj.nec.com/song00advanced.html/,2001-10
  • 9Simon F L.Distributed Denial of Service Attacks[EB/OL].http://citeseer.nj.com/cathedpage/313019/2,2000-03-03

二级参考文献9

  • 1[1]Bellovin S M. Security problems in the TCP/IP protocol suite. Computer Communication Review, 1989,19(2):32~48
  • 2[2]Tanenbaum A S. Computer networks (3rd edition). Prentic-Hall International, Inc, 1996.396~448
  • 3[3]Hedrick C. Routing information protocol. RFC 1058, 1988.5~31
  • 4[4]Postel J. Internet control message protocol. RFC 792,1981.2~18
  • 5[5]Rekhter Y, Moskowitz G R, Karrenberg D,et al. Address allocation for privarc internets.RFC 1918,1996.1~7
  • 6[6]Ferguson P, Senie D. Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. RFC 2267,1998.2~10
  • 7[7]Hare C, Siyan K. Internet firewalls and networks security (2nd edition). New Riders Publishing, 1998.122~178
  • 8Chen S S,CIDF[EB/OL].Http://seclab.cs.ucdavis.edu/cidf,1999年
  • 9刘昕,吴秋峰,袁萌.DDOS(分布式拒绝服务)研究与探讨[J].计算机工程与应用,2000,36(5):131-133. 被引量:15

共引文献62

同被引文献6

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部