期刊文献+

网络服务管理中DDoS攻击预防策略 被引量:1

Some Prevention Tactics for the Attack from D Dos in The Network Service Management
下载PDF
导出
摘要 针对当前对于网络服务器威胁最大的攻击方式——分布式拒绝服务 ( DistributedDenial of Service,DDo S)攻击 ,进行了详细地剖析 ,介绍了当前常见的攻击方式 ,并分析了这些攻击方式的特点 。
作者 黄妍妍
出处 《河北科技图苑》 2003年第5期31-33,共3页 Hebei Library Journal of Science and Technology
  • 相关文献

参考文献8

二级参考文献18

  • 1MERIKE Kaeo.网络安全性设计[M].北京:人民邮电出版社,2000..
  • 2Russell Lusignan.Cisco网络安全管理[M].北京:中国电力出版社,2001..
  • 3YOUNG M J.Visual C++4从入门到精通(第二版)[M].北京:电子出版社,1997..
  • 4[1]Bellovin S M. Security problems in the TCP/IP protocol suite. Computer Communication Review, 1989,19(2):32~48
  • 5[2]Tanenbaum A S. Computer networks (3rd edition). Prentic-Hall International, Inc, 1996.396~448
  • 6[3]Hedrick C. Routing information protocol. RFC 1058, 1988.5~31
  • 7[4]Postel J. Internet control message protocol. RFC 792,1981.2~18
  • 8[5]Rekhter Y, Moskowitz G R, Karrenberg D,et al. Address allocation for privarc internets.RFC 1918,1996.1~7
  • 9[6]Ferguson P, Senie D. Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. RFC 2267,1998.2~10
  • 10[7]Hare C, Siyan K. Internet firewalls and networks security (2nd edition). New Riders Publishing, 1998.122~178

共引文献26

同被引文献14

  • 1王颖熙.基于UDP的DDoS攻击实验[J].中山大学研究生学刊(自然科学与医学版),2004,25(4):100-112. 被引量:1
  • 2顾群业,李广福.拒绝服务攻击方式分析及防御策略部署[J].网络安全技术与应用,2005(7):43-45. 被引量:2
  • 3林梅琴,李志蜀,袁小铃,周密,王雪松,童铭.分布式拒绝服务攻击及防范研究[J].计算机应用研究,2006,23(8):136-138. 被引量:11
  • 4李长隆.DDoS攻击的原理及防范DDoS攻击的策略[J].电脑与电信,2007(8):39-40. 被引量:3
  • 5张卫东 李晖 尹钰.网络安全实验教学方法的研究.实验室研究与探索,2007,(12):286-289.
  • 6GASTI P, TSUDIK G, UZUN E, et al. DoS and DDoS in named data networking [ J ]. International Conference on Computer Communications and Networks, 2013, 44 (3) : 1-7.
  • 7ZARGAR S T, JOSHI J, TIPPER D. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks[J]. Communications Surveys & Tutorials, 2013, 15(4) : 2046-2069.
  • 8PENG T, LECKIE C, Ramamohanarao K. Survey of net- work -based defense mechanisms countering the DoS and DDoS problems [J] . ACM Computing Surveys, 2007, 39(1): 3.
  • 9JEON D. Understanding DDoS attack, tools and free anti - tools with recommendation [ EB/OL ]. [ 2014 - 08 - 25 ] . http: //www. sans. org/infoseFAQ/threats/Under- stamding ddos. htm.
  • 10ISOZAKI H, ATA S, OKA I, et al. Performance im- provement on probabilistic packet marking by using history caching [ C ] //APSITr' OS Information and Telecommu- nication Technologies, 2005.6th Asia - Pacific Sympo sium, Piscafauany, N. J: IEEE Press, 2005:381-386.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部