摘要
综合叙述了常见的网络攻击方法,对探针、拒绝服务、、、数据大类攻击方法进行了分析,并对、、R2LU2R5SYN Flooding DDoSIP 、、缓冲区溢出、劫持等重要的攻击方法进行了具体的分析研究,最后,提出了“基于审计记录的入侵检测spoofing Trojan(Buffer-overflow)TCP模型”作为网络安全攻击的对策。
A survey of the common network attacks are presented and five kinds of attacks include Probe,DoS,R2L,U2R and Data attacksare analysed.Some important attacks such as SYN Flooding,DDoS,IP spoofing,Trojan,Buffer_overflow and TCP hijack are researched particularly. Finally, as a countermeasure,the intrusion-detection model based on audit record is proposed in detail. ;;;
出处
《计算机工程》
CAS
CSCD
北大核心
2002年第8期9-11,216,共4页
Computer Engineering
基金
天津市青年科学基金资助