期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
基于DDoS的TCP SYN攻击与防范 被引量:6
1
作者 曹玥 李晖 吕东亚 《电子科技》 2004年第2期19-23,共5页
分布式拒绝服务攻击(DDoS)是出现在这几年的一种具有很强攻击力而又缺乏有效防御手段的Internet攻击手段,是目前网络安全界研究的热点。TCP SYN 洪流攻击是最常见的DDoS攻击手段之一。文中在对DDoS攻击进行深入研究的基础上,着重对TCP S... 分布式拒绝服务攻击(DDoS)是出现在这几年的一种具有很强攻击力而又缺乏有效防御手段的Internet攻击手段,是目前网络安全界研究的热点。TCP SYN 洪流攻击是最常见的DDoS攻击手段之一。文中在对DDoS攻击进行深入研究的基础上,着重对TCP SYN 洪流攻击及其防范措施进行了深入研究,提出了一种新的综合攻击检测技术,较好地解决了对此类攻击的防范问题。 展开更多
关键词 ddos tcp syn洪流攻击 分布式拒绝服务攻击 INTERNET 网络安全 防范措施
下载PDF
TCP DDoS攻击与防范 被引量:1
2
作者 李继良 《电脑知识与技术(过刊)》 2007年第18期1520-,1545,共2页
随着互联网的迅速普及和应用的不断发展,各种黑客工具和网络攻击手段也随之倍出,网络攻击导致网络和用户受到侵害,其中分布式拒绝服务DDoS以其攻击范围广、隐蔽性强、简单有效等特点成为常见的网络攻击技术之一,极大地影响网络和业务主... 随着互联网的迅速普及和应用的不断发展,各种黑客工具和网络攻击手段也随之倍出,网络攻击导致网络和用户受到侵害,其中分布式拒绝服务DDoS以其攻击范围广、隐蔽性强、简单有效等特点成为常见的网络攻击技术之一,极大地影响网络和业务主机系统的有效服务.其中的TCP DDoS它利用了传统协议中三次握手协议的不安全性,向互联网服务器发送大量的报文.由于服务器接收大量无效的报文,而使得正常的报文无法得到及时响应.如何检测这种攻击发生以及如何降低这种攻击所带来的后果已成为目前安全界研究的热点问题. 展开更多
关键词 tcp ddos syn flooding syn TIMEOUT
下载PDF
基于SYN的DDoS攻击的判定和过滤机制 被引量:3
3
作者 胡龙茂 周健 张伟 《微计算机信息》 北大核心 2008年第15期74-76,共3页
介绍了基于SYN的分布式拒绝服务(Distributed Denial of Service,DDoS)的原理,提出基于数据包流量的检测方法及包过滤机制。通过计算当前瞬时流量与预测流量的偏离程度及半连接数量,判断主机是否受到攻击。攻击发生后,通过在SYN包中加... 介绍了基于SYN的分布式拒绝服务(Distributed Denial of Service,DDoS)的原理,提出基于数据包流量的检测方法及包过滤机制。通过计算当前瞬时流量与预测流量的偏离程度及半连接数量,判断主机是否受到攻击。攻击发生后,通过在SYN包中加入认证码进行过滤,降低分布式拒绝服务攻击的危害。 展开更多
关键词 分布式拒绝服务 syn洪流 流量检测 消息认证码
下载PDF
基于SYN Cookie防御DDoS的技术研究
4
作者 樊勇 鲜明 《电脑知识与技术》 2009年第3X期2324-2325,共2页
分布式拒绝服务(DDoS)攻击是目前黑客经常采用而难以防范的攻击手段。文章介绍了SYN Flood攻击及防御的基本原理和技术,详细分析了几种基于SYN Cookie的防御方法,最后,对几种方法进行了相应的试验比较。
关键词 ddos tcp/IP syn Flood syn Cookie
下载PDF
McAfee SecurityCenter Evaluation under DDoS Attack Traffic
5
作者 Sirisha Surisetty Student Member Sanjeev Kumar 《Journal of Information Security》 2011年第3期113-121,共9页
During the Distributed Denial of Service (DDoS) attacks, computers are made to attack other computers. Newer Firewalls now days are providing prevention against such attack traffics. McAfee SecurityCenter Firewall is ... During the Distributed Denial of Service (DDoS) attacks, computers are made to attack other computers. Newer Firewalls now days are providing prevention against such attack traffics. McAfee SecurityCenter Firewall is one of the most popular security software installed on millions of Internet connected computers worldwide. “McAfee claims that if you have installed McAfee SecurityCentre with anti-virus and antispyware and Firewall then you always have the most current security to combat the ever-evolving threats on the Internet for the duration of the subscription”. In this paper, we present our findings regarding the effectiveness of McAfee SecurityCentre software against some of the popular Distributed Denial Of Service (DDoS) attacks, namely ARP Flood, Ping-flood, ICMP Land, TCP-SYN Flood and UDP Flood attacks on the computer which has McAfee SecurityCentre installed. The McAfee SecurityCentre software has an in built firewall which can be activated to control and filter the Inbound/Outbound traffic. It can also block the Ping Requests in order to stop or subside the Ping based DDoS Attacks. To test the McAfee Security Centre software, we created the corresponding attack traffic in a controlled lab environment. It was found that the McAfee Firewall software itself was incurring DoS (Denial of Service) by completely exhausting the available memory resources of the host computer during its operation to stop the external DDoS Attacks. 展开更多
关键词 Distributed DENIAL of Service (ddos) ATTACK MCAFEE FIREWALL NonPaged Pool Allocs ARP FLOOD Ping-Flood ICMP Land tcp-syn FLOOD UDP FLOOD ATTACK
下载PDF
Blue Screen of Death Observed for Microsoft Windows Server 2012 R2 under DDoS Security Attack
6
作者 Koushicaa Sundar Sanjeev Kumar 《Journal of Information Security》 2016年第4期225-231,共7页
Microsoft server Operating Systems are considered to have in-built, host based security features that should provide some protection against Distributed Denial of Service (DDoS) attacks. In this paper, we presented re... Microsoft server Operating Systems are considered to have in-built, host based security features that should provide some protection against Distributed Denial of Service (DDoS) attacks. In this paper, we presented results of experiments that were conducted to test the security capability of the latest server Operating System from Microsoft Inc., namely Windows Server 2012 R2. Experiments were designed to evaluate its in-built security features in defending against a common Distributed Denial of Service (DDoS) attack, namely the TCP-SYN based DDoS attack. Surprisingly, it was found that the Windows Server 2012 R2 OS lacked sufficient host-based protection and was found to be unable to defend against even a medium intensity3.1 Gbps-magnitude of TCP-SYN attack traffic. The server was found to crash within minutes after displaying a Blue Screen of Death (BSoD) under such security attacks. 展开更多
关键词 Network Security Server Security ddos Attack tcp syn Flood Blue Screen of Death
下载PDF
一种基于流量控制的DDOS检测方法
7
作者 尉辉根 《电脑知识与技术(过刊)》 2012年第4X期2480-2482,共3页
描述了DDoS攻击步骤和攻击特点,在此基础上具体分析了当前最流行的DDoS攻击行为TCP SYN Flood的攻击原理,根据该原理提出了一种实时识别DDoS攻击的检测和防御系统框架和系统流程,为研究DDoS攻击防御策略提供参考。
关键词 分布式拒绝服务攻击 路由器 tcp syn Flood
下载PDF
DDoS下的TCP洪流攻击及对策 被引量:10
8
作者 孙曦 朱晓妍 王育民 《网络安全技术与应用》 2004年第4期31-34,共4页
分布式拒绝服务攻击(DDoS)是近年来出现的一种极具攻击力的Internet攻击手段,而TCP洪流攻击是其最主要的攻击方式之一。本文提出了一种针对TCP洪流攻击的本地攻击检测-过滤LADF机制,其部署于受害者及其上游ISP网络。该机制综合使用了一... 分布式拒绝服务攻击(DDoS)是近年来出现的一种极具攻击力的Internet攻击手段,而TCP洪流攻击是其最主要的攻击方式之一。本文提出了一种针对TCP洪流攻击的本地攻击检测-过滤LADF机制,其部署于受害者及其上游ISP网络。该机制综合使用了一种基于信息熵的异常检测技术、SYN-cookie技术和“红名单”技术来检测攻击报文,最终结合新型防火墙技术,构建起一个完善的本地DDoS防御系统。 展开更多
关键词 分布式拒绝服务攻击 ddos tcp洪流 信息熵 消息认证码 syn-cookie
原文传递
云计算环境下TCP-SYN Flood攻击防御策略研究
9
作者 肖敏 《绵阳师范学院学报》 2022年第2期84-91,97,共9页
在新兴的网络技术SDN(软件定义网络)中,通过使用转发和控制分离技术允许网络运营商动态的配置和管理基础设施.Openvswitch是云计算环境下一种主流的SDN虚拟交换机.本文提出了一种在Openvswitch环境下针对TCP-SYN Flood攻击的防御策略,... 在新兴的网络技术SDN(软件定义网络)中,通过使用转发和控制分离技术允许网络运营商动态的配置和管理基础设施.Openvswitch是云计算环境下一种主流的SDN虚拟交换机.本文提出了一种在Openvswitch环境下针对TCP-SYN Flood攻击的防御策略,通过使用一个试验台,实现了所提出的算法,评估了其对于系统性能的影响,结果显示该算法能有效地抵御TCP-SYN Flood攻击. 展开更多
关键词 ddos 云计算 tcp-syn Flood攻击
下载PDF
可信赖网络中的TCP拦截扩散策略 被引量:2
10
作者 金光 赵一鸣 +1 位作者 沈明昕 钱家麒 《计算机工程》 CAS CSCD 北大核心 2004年第1期118-120,共3页
介绍了分布式拒绝服务攻击的原理及与其相关的入侵检测和防范对策,提出了针 对SYN泛滥攻击,采用TCP拦截扩散策略,由可信赖网络内的多个路由器代替受攻击的单个路 由器完成过滤防御任务,并对此策略的特点和效率作了一定分析。
关键词 可信赖网络 ddos syn泛滥 tcp拦截
下载PDF
SYN Flood攻击的原理机制/检测与防范措施 被引量:1
11
作者 钱峰 张蕾 《福建电脑》 2005年第9期62-62,45,共2页
SYN-Flood是目前最流行的DDoS攻击手段,是一种蓄意侵入三次握手并打开大量半开TCP/IP连接而进行的攻击。本文介绍了SYNFlood攻击的原理机制/检测与防范方法。
关键词 syn syn FLOOD攻击 攻击手段 防范措施 检测 机制 原理 tcp/IP ddos
下载PDF
基于SYN Cookie下防分布式拒绝服务攻击算法的分析与实现 被引量:8
12
作者 沈清 金心宇 周绮敏 《计算机应用》 CSCD 北大核心 2005年第12期2745-2747,共3页
介绍了分布式拒绝服务(DistributedDenialofService,DDoS)根据TCP/IP缺陷的攻击原理,在分析了数据包流量与系统资源使用率检测的基础上,提出了在SYNCookie中引入RSA公钥加密过滤TCP/IP数据包的方法,用来检测与降低DDoS攻击的危害,该方... 介绍了分布式拒绝服务(DistributedDenialofService,DDoS)根据TCP/IP缺陷的攻击原理,在分析了数据包流量与系统资源使用率检测的基础上,提出了在SYNCookie中引入RSA公钥加密过滤TCP/IP数据包的方法,用来检测与降低DDoS攻击的危害,该方法在实验中的测试阶段取得了较好的效果。 展开更多
关键词 分布式拒绝服务 syn COOKIE RSA 传输控制协议 洪流攻击
下载PDF
Experimental Evaluation of Juniper Network's Netscreen-5GT Security Device against Layer4 Flood Attacks 被引量:2
13
作者 Sanjeev Kumar Raja Sekhar Reddy Gade 《Journal of Information Security》 2011年第1期50-58,共9页
Cyber attacks are continuing to hamper working of Internet services despite increased use of network secu-rity systems such as firewalls and Intrusion protection systems (IPS). Recent Distributed Denial of Service (DD... Cyber attacks are continuing to hamper working of Internet services despite increased use of network secu-rity systems such as firewalls and Intrusion protection systems (IPS). Recent Distributed Denial of Service (DDoS) attacks on Dec 8th, 2010 by Wikileak supporters on Visa and Master Card websites made headlines on prime news channels all over the world. Another famous DDoS attacks on Independence Day weekend, on July 4th, 2009 were launched to debilitate the US and South Korean governments’ websites. These attacks raised questions about the capabilities of the security systems that were used in the network to counteract such attacks. Firewall and IPS security systems are commonly used today as a front line defense mechanism to defend against DDoS attacks. In many deployments, performances of these security devices are seldom evaluated for their effectiveness. Different security devices perform differently in stopping DDoS attacks. In this paper, we intend to drive the point that it is important to evaluate the capability of Firewall or IPS secu-rity devices before they are deployed to protect a network or a server against DDoS attacks. In this paper, we evaluate the effectiveness of a security device called Netscreen 5GT (or NS-5GT) from Juniper Networks under Layer-4 flood attacks at different attack loads. This security device NS-5GT comes with a feature called TCP-SYN proxy protection to protect against TCP-SYN based DDoS attacks, and UDP protection feature to protect against UDP flood attacks. By looking at these security features from the equipments data sheet, one might assume the device to protect the network against such DDoS attacks. In this paper, we con-ducted real experiments to measure the performance of this security device NS-5GT under the TCP SYN and UDP flood attacks and test the performance of these protection features. It was found that the Juniper’s NS-5GT mitigated the effect of DDoS traffic to some extent especially when the attack of lower intensity. However, the device was unable to provide any protection against Layer4 flood attacks when the load ex-ceeded 40Mbps. In order to guarantee a measured level of security, it is important for the network managers to measure the actual capabilities of a security device, using real attack traffic, before they are deployed to protect a critical information infrastructure. 展开更多
关键词 Distributed DENIAL of Service (ddos) tcp-syn FLOOD ATTACK tcp-syn PROXY Protection FIREWALL Security UDP FLOOD ATTACK
下载PDF
Analysis and Defense of Network Attacking Based on the Linux Server
14
作者 Dapeng Lang Wei Ding +1 位作者 Yuhan Xiang Xiangyu Liu 《国际计算机前沿大会会议论文集》 2019年第1期370-372,共3页
The kernel of the Linux server is analyzed to find out the main cause of the server’s denial of service when it is attacked. In the kernel, when the connection request information memory is full, the new connection r... The kernel of the Linux server is analyzed to find out the main cause of the server’s denial of service when it is attacked. In the kernel, when the connection request information memory is full, the new connection request is discarded. Therefore, the printk function was used to alert the kernel output log when the memory was full, the processing of discarding the connection request in the kernel was changed, and the function tcp_syn_flood_action was applied to full memory processing. In the function tcp_syn_flood_action, the free function was used to release the memory according to the condition, so that the new connection request has a storage space, thereby offering the server’s normal service. Finally, the proposed defense technology is verified to be effective. 展开更多
关键词 tcp/IP ddos syn FLOOD System KERNEL
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部