期刊文献+

Web服务器上应用层DDoS检测方法的改进 被引量:2

Detection Improvement of Application-layer DDoS on Web Server
原文传递
导出
摘要 随着互联网越来越普及,它的弱点也被攻击者们越来越多地加以利用并攻击,由此造成了很大的损失。DDoS攻击是一个危害非常大的攻击方式,传统上的基于网络层的DDoS攻击方式由于技术的进步已经在很大程度上得到了抑制。现在,更多的DDoS攻击发生在应用层。尽管已经有了很多的检测方法,但是这种攻击在现阶段来说并没有得到根本的解决。文章将解释应用层DDoS攻击的原理及常见手段,并归纳总结现阶段主要的防御方法。最后针对这些方法中的不足提出了一种改进措施。 With the development of the Internet, more attackers utilize and attack the weak points of network, this often results in various damages. As far as the network is concerned, DDoS is always a very dangerous way, while the traditional DDoS attack on the network layer is restrained owing to the technical advances. Nowadays, more DDoS attacks occur on the application layer, and although there exist many detect methods, the application DDoS attack is not radically resolved. This article discusses the discipline and measures of application DDoS attack, summarizes the principal defending methods at present. Finally for the shortcomings of these methods, some improvements are proposed
出处 《信息安全与通信保密》 2013年第2期63-65,共3页 Information Security and Communications Privacy
基金 国家自然科学基金资助项目(批准号:61171173)
关键词 互联网 应用层 DDOS攻击 检测 application DDoS attack detect
  • 相关文献

参考文献8

二级参考文献25

  • 1史力力,薛质,王轶骏.分布式防火墙与入侵检测联合系统的设计[J].信息安全与通信保密,2008,30(2):65-67. 被引量:7
  • 2于国防,王军号.增强型Web登录安全策略研究[J].计算机工程与设计,2005,26(12):3276-3277. 被引量:10
  • 3吉治钢.基于验证码破解的HTTP攻击原理与防范[J].计算机工程,2006,32(20):170-172. 被引量:20
  • 4AHN L V, BLUN M, HOPPER N J, et al. CAPTCHA: using hard AI problems for security[C]//Lecture Notes in Computer Science, vol 2656. [S.l.] :Springer-Verlag, 2003:646-653.
  • 5KANDULA S, KATABI D, JACOB M, et al. Botz-4-Sale: surviving organized DDoS attacks that mimic flash crowds[C]//Proc of the 2nd Symposium on Networked Systems Design and Implementation. 2005:287-300.
  • 6RANJAN S, SWAMINATHAN R, UYSAL M, et al. DDoS-resilient scheduling to counter application layer attacks under imperfect detection[C]//Proc of the 25th IEEE International Conference on Computer Communications. Barcelona:IEEE Press, 2006:1-13.
  • 7YATAGAI T, ISOHARA T, SASASE I. Detection of HTTP-GET flood attack based on analysis of page access behaviour[C]//Proc of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing. Victoria: IEEE Press, 2007:232-235.
  • 8WALFISH M, VUTUKURU M, BALAKRISHNAN H, et al. DDoS defense by offense[C]//Proc of Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. New York:ACM Press, 2006:303-314.
  • 9OIKONOMOU G, MIRKOVIC J. Modeling human behaviour for defense against flash-crowd attacks[C]//Proc of IEEE International Conference on Communications.Dresden: IEEE Press, 2009:1-6.
  • 10TracesavailableintheInternettrafficarchive[EB/OL].http://ita.ee.lbl.gov/html/traces.html.

共引文献32

同被引文献14

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部