期刊文献+

一种新的DDoS攻击方法及对策 被引量:7

A New DDoS Attack and a Countermeasure against It
下载PDF
导出
摘要 分布式拒绝服务攻击(DDoS)利用了网络协议的弱点,其攻击方式简单,但危害巨大。该文通过分析一种新出现的DDoS攻击方法-利用反弹技术实现的DDOS攻击,讨论其工作原理,提出了一种新的抗攻击方案。该方案不仅对这种新的攻击方法有效,而且同样适用于其他的DDoS攻击。 DDoS attacks utilize the flaws of network protocol.They are easy to be committed but is great harmful.Through ananlysing a new DdoS attack-DDoS attack with reflectors,this paper discuss its principle and put s forward a new countermeasure against it.This measure is not only suitable for DDoS attack with reflectors but also suitabe for other DDoS attacks.
出处 《计算机工程与应用》 CSCD 北大核心 2003年第1期144-146,共3页 Computer Engineering and Applications
基金 国家自然科学基金资助项目(编码:90104005 66973034)
关键词 DDOS 分布式拒绝服务攻击 反弹服务器 主干网 网络安全 计算机网络 DDoS,reflector,backbone network,countermeasure
  • 相关文献

参考文献4

二级参考文献22

  • 1YOUNG M J.Visual C++4从入门到精通(第二版)[M].北京:电子出版社,1997.. 被引量:1
  • 2[1]Bellovin S M. Security problems in the TCP/IP protocol suite. Computer Communication Review, 1989,19(2):32~48 被引量:1
  • 3[2]Tanenbaum A S. Computer networks (3rd edition). Prentic-Hall International, Inc, 1996.396~448 被引量:1
  • 4[3]Hedrick C. Routing information protocol. RFC 1058, 1988.5~31 被引量:1
  • 5[4]Postel J. Internet control message protocol. RFC 792,1981.2~18 被引量:1
  • 6[5]Rekhter Y, Moskowitz G R, Karrenberg D,et al. Address allocation for privarc internets.RFC 1918,1996.1~7 被引量:1
  • 7[6]Ferguson P, Senie D. Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. RFC 2267,1998.2~10 被引量:1
  • 8[7]Hare C, Siyan K. Internet firewalls and networks security (2nd edition). New Riders Publishing, 1998.122~178 被引量:1
  • 9[1]CERT DSI Tools Workshop Report. http://www. cert. org/reports/dist_workshop. pdf 被引量:1
  • 10[2]CERT Advisory DOS Tools. http://www. cert. org/advisories/CA -99- 17 - denial - of - service - tools. html 被引量:1

共引文献25

同被引文献22

  • 1陈明奇.分布式拒绝服务攻击处理实例分析[J].信息网络安全,2007(6):36-37. 被引量:11
  • 2徐远超,刘江华,刘丽珍,关永.基于Web的网络爬虫的设计与实现[J].微计算机信息,2007,23(21):119-121. 被引量:36
  • 3Blackert, W. J. ; Gregg, D. M. ; Castner, A. K. ; Hom, R.L. ; Jokerst, R. M. ; Kyle, E. M. , Distributed denial of service defense attack tradeoff analysis (DDOSDATA) demonstration overview [A]. DARPA Information Survivability Conference and Exposition,2003 [C].Proceedings, Volume : 2,2003, Page (s) : 66- 67. 被引量:1
  • 4Mirkovic, J. ; Prier, G. ; Reiher, P. , Attacking DDoS at the source, Network Protocols [A]. 2002. Proceedings.10th IEEE International Conference [C]. 2002, Page (s):312-321. 被引量:1
  • 5Harris.Denying Denial-of-Service,Information Security Magazine[DB/OL].http://www.infosecuritymag.com/articles/september01/cover.shtml,2001 被引量:1
  • 6Lee Garber.Denial-of-Service,Attack Rip the Internet[J].IEEE Computer,2000,04 被引量:1
  • 7Thomer M.Gil.A Data-structure for Bandwidth Attack Detection.Proceeding of the 10th USENIX Security of Symposium[DB/OL].http://www.usenix.org/publications/library/proceedings/sec01/gil.htm,2001. 被引量:1
  • 8Steven J.Templeton.Detecting Spoofed Packets[C].DISCEX'03,2003:164~175 被引量:1
  • 9Laura Feinstein.Statistical Approaches to DDoS Attack Detection And Response[C].DISCEX'03,2003:303~314 被引量:1
  • 10Kihong Park,Heejo Lee.A Proactive Approach to Distributed Dos Attack Prevention using Route-Based Packet Filtering[R].Technical Report,CSD00-017,Department of Computer Sciences,Purdue University,2000 被引量:1

引证文献7

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部