期刊文献+

抵御DDoS攻击的陷阱系统 被引量:14

Honeynet System to Defend the DDoS Attacks
在线阅读 下载PDF
导出
摘要 分布式拒绝服务(DDoS)攻击对Internet仍然是一个严重的威胁,针对这种攻击 手段,人们提出了许多解决方法,但都没有取得令人满意的结果。该文在分析DDoS攻击技术 的基础上,介绍了陷阱系统这一主动防御技术的实现原理及功能,提出了利用陷阱系统来保 护网络免受DDoS攻击的思想并进行了设计和实现。 Distributed denial of service attacks are still a big threat to the Internet. Several proposals for coping with the attacks have been made in the re cent past, but neither of them is successful on themselves alone. This paper int roduces the implementation and function of the honeynet——A system-proactive pr otecting technology based on the analysis of DDoS attacks and presents the idea using the honeynet system to protect the network avoiding the DDoS attacks, and fulfills the design and implementation.
出处 《计算机工程》 CAS CSCD 北大核心 2004年第1期10-13,共4页 Computer Engineering
基金 中国科学院知识创新工程重大项目(KJCX1-09)
关键词 分布式拒绝服务 陷阱系统 蜜罐 停火区 Distributed denial of service(DDoS) Honeynet system Honeypot DMZ
  • 相关文献

参考文献13

  • 1[1]Harrison A. The Denial-of-service Attack Aftermath. http://www.cnn. com/2000/TECH/computing /02/14/dos.aftermath.idg, 2000
  • 2[2]Power R. 2001 CSI/FBI Computer Crime and Security Survey. Technical Report, Computer Security Institute, 2001
  • 3[3]Stein L D, Stewart J N. The World Wide Web Security FAQ-Version 3.1.2. http://www.w3.org/Security/Faq/, 2002-02
  • 4[4]Paxson V. An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks. Computer Communication Review, 2001,31(3)
  • 5[5]Cisco Systems, Inc. Cisco Security Advisory: 7xx Router Password Buffer Overflow. http://www.cisco.com/warp/public/770/pwbuf-pub. shtml, 1998-07
  • 6[6]Huegen C A. The Latest in Denial of Service Attacks: Smurfing Des- cription and Information to Minimize Effects. White Paper, 2000-02
  • 7[7]CERT Coordination Center. CA-1999-17: Denial of Service Tools.http: //www.cert.org/advisories/CA-2000-01.html.
  • 8[8]Cisco Systems Inc.. Defining Strategies to Protect Against TCP SYN Denial of Service Attacks. Http://www.cisco.com/warp/public/707/4. Html, 1999-07
  • 9[9]Ferguson P, Senie D. Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing. RFC2267, 1998-01
  • 10[10]Bellovin S. ICMP Traceback Messages. Http://www.research.att.com/ ~smb/papers/draft-bellovin-itrace-00.txt, 2000-03

同被引文献87

引证文献14

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部