期刊文献+

DDoS攻击原理与防御

Principle and Defending of DDoS Attack
在线阅读 下载PDF
导出
摘要 分布式拒绝服务攻击(Distributed Denial of Serviece Attack)是目前黑客用的比较多的攻击手段,这种攻击对网络造成的危害性越来越大。为了更好地了解这种攻击的特点,从而避免产生更大的损失,这里从DoS和DDoS的攻击原理进行探讨研究,研究常见的DDoS攻击的类型如Smurf攻击、Trinoo攻击等。根据这些攻击的特点,提出DDoS攻击的检测方法即基于特征的攻击检测和基于异常的攻击检测。这两种检测技术各有所长,在实际使用中往往需要将两者结合起来,共同提高DDoS检测的准确性。 Distributed Denial of Service Attack(DDoS)is currently used by hackers as a commonly used tool to attack, and such attack on the network caused the increasing dangers, in order to better understand the characteristics of such attack as well as to avoid greater losses, the study of DoS and DDoS attacks' principle is proposed, and some common type of DDoS attack such as Smurf attack, Trinoo attack, makes two innovative DDoS attack detection methods that is feature -based and anomaly-based attack detection. These two detection technology knowledge have their own advantages, in the actual use is often the combination of common DDoS to improve the accuracy of detection.
作者 刘敏娜
机构地区 咸阳师范学院
出处 《现代电子技术》 2009年第14期54-56,共3页 Modern Electronics Technique
基金 咸阳师范学院2007年专项科研基金资助项目(07XSYK280)
关键词 DDOS攻击 DOS攻击 检测方法 防御 DDoS attack DoS attack detection defense
  • 相关文献

参考文献12

  • 1璞青.Dos(拒绝服务)攻击技术分析及其防范.网络与应用,2005,(8):45-47.
  • 2李泽林,苏淑靖.Internet安全技术[M].北京:国防工业出版社,2005:149-151,334-359.
  • 3尚占锋,章登义.DDoS防御机制研究[J].计算机技术与发展,2008,18(1):7-10. 被引量:9
  • 4Yitzhaky Y,Kopeika N S.Identification of Blur Parameters from Motion Blurred Images[J].Graphical Models and Image Processing,1997,59(5):310-320.
  • 5Merike Kaeo.网络安全性设计[M].2版.北京:人民邮电出版社,2005.
  • 6吴虎,刘云超,陈挺.对DDoS攻击防范策略的研究及若干实现[J].计算机应用研究,2002,19(8):34-36. 被引量:24
  • 7Kim Y W,Lau W C,Chuah M C,et al.Packetseore:Statistieal-based Overload Control against Distributed Denial-of-Service Attacks[A].Proc.of the 23rd Annual Joint Conf.of the IEEE ComPuter and Communieations Societies[C].2004,4:2 594-2 604.
  • 8吴国纲.DDoS攻击与IP拥塞控制研究[J].电子科技大学学报,2007,36(3):614-616. 被引量:9
  • 9刘芳,陈泰伟,戴葵.分布式拒绝服务攻击预警系统的设计与实现[J].计算机工程,2001,27(5):129-130. 被引量:10
  • 10Lokhande R,Arya K V,Gupta P.Identification of Parameters and Restoration of Motion Blurred Images[A].Proceedings of the 2006 ACM Symposium on Applied Computing[C].USA:ACM Press,2006:301-305.

二级参考文献32

  • 1Vern Paxson. An Analysis of Using Reflectors for Distributed Denial-of-Service. Volume 31, Issue 3July 2001 Pages: 38-47.
  • 2Steve Gibson. http://grc. com/dos/drdos. htm February 22nd, 2002.
  • 3http://www. yesky. com/SoftChannel/72356695560421376/20030916/1728964. shtml,2003 -09 -16.
  • 4http://www. friendshow. com/cgi - bin/topic. cgi?forum = 16&topic = 7&show = 0.
  • 5.拒绝服务攻击原理及解决方法[EB/OL].http://www.HackBase.com.,2004.
  • 6徐一丁.骇客对其侵占的计算机的利用[DB].http://www- 900. ibm. com/develop erworks/cn/security/se -gwattack/index. shtml,2002.
  • 7Jie Wu.Distributed Systems Design.CRC Press LLC,1999中译本,北京:机械工业出版社,2001.
  • 8Yang Xinyu,Yang Wenjing,Zeng Ming,et al.A Novel Network Traffic Analysis Method Based on Fuzzy Association Rules.LNAI,2004:81-91.
  • 9[美]Michael A Gallo,William M Hancock.计算机通信和网络技术[M].王玉峰,邹仕洪,黄东晖,等译.北京:人民邮电出版社,2003.
  • 10应向荣.主动防御系统的重要性[N].中国计算机报,网络与通信,2003,7.

共引文献53

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部