期刊文献+

基于免疫的对等网络DoS攻击防御系统 被引量:2

Computer defense system of DoS attacks in peer-to-peer network based on immunity
下载PDF
导出
摘要 通过学习自然免疫系统和研究对等网络DoS问题与传统网络中的区别,提出了一种基于免疫的对等网络DoS攻击防御系统。在系统中,对等网每个节点都有一个可根据环境学习和动态改变的免疫智能体,它能够自动检测网络并对具有DoS攻击特征的数据进行控制,从而把攻击扼杀在萌芽状态。系统具有分布性、自适应性、可扩展性等特点。 An immunity-based computer defense system of DoS attacks in peer-to-peer (P2P) network from research of the natural immune system and the difference between DoS in traditional network and DoS in P2P network is presented. In this system, every node of P2P network has one immune intellectual body which can study and change dynamically according to its environmental alteration. The body can detect DoS attacks automatically and control the data which have the characteristics of attacks. The system has characteristics of distributing, adaptivity and expansibility.
作者 谭艳霞 吴灏
出处 《计算机工程与设计》 CSCD 北大核心 2006年第22期4204-4206,共3页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目(2003AA146010)
关键词 对等网 拒绝服务 免疫 防御系统 攻击请求 peer-to-peer network DoS immunity defense system query-attack
  • 相关文献

参考文献8

  • 1Daswani N,Garcia-Molina H,Yang B.Open problems in datasharing peer-to-peer systems[C].Heidelberg:Proc of the 9th Int'l Conf on Database Theory (ICDT),Springer-Verlag,2003.1-15. 被引量:1
  • 2Dana Moore John Hebeler.Peer-to-Peer network[M].TsingHua University Press,2003. 被引量:1
  • 3Jelena Mirkovic,Sven Dietrich,David Dittrich.Internet denial of service:Attack and defense mechanisms[M].Prentice Hall PTR,2004. 被引量:1
  • 4Forrest S,Hofmeyr S A,Somayaji A.Computer immunology[J].Communications of the ACM,1997,40(10):88-96. 被引量:1
  • 5Forrest S,Perelson A S,Allen L,et al.Self-nonself discrimination in a computer[C].Los Alamitos,CA:Proceedings of the 1994IEEE Symposium on Research in Security and Privacy,IEEE Computer Society Press,1994 被引量:1
  • 6Dorothy E,Denning.An intrusion detection model[J].IEEE Transaction on Software Engineering,1987,13(2):222-232. 被引量:1
  • 7Kim J.Bentley P.The artificial immune model for network intrusion detection[C].7th European Conference on Intelligent Techniques and Soft Computing,1999. 被引量:1
  • 8Holland J H,Holyoak K J,Nisbett R E,et al.Induction:Processes of inference,learning,and discovery[M].MIT Press,1986. 被引量:1

同被引文献22

  • 1胡影,鲜明,肖顺平.DoS攻击效果评估系统的设计[J].计算机工程与科学,2005,27(2):15-16. 被引量:9
  • 2易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 3马新新,赵洋,秦志光.Improving Resilience against DDoS Attack in Unstructured P2P Networks[J].Journal of Electronic Science and Technology of China,2007,5(1):18-22. 被引量:6
  • 4Gabriel Maciá-Fernández. Evaluation of a low-rate DoS attack against iterative servers [J]. Computer Networks: The International Journal of Computer and Telecommunications Networking, 2007,51(4):1013-1030. 被引量:1
  • 5Pete Perlegos. DoS defense in structured peer-to-peer networks [R]. Berkeley: University of California, 2004. 被引量:1
  • 6Ye Baoqing. Network denial-of-service classification, detection, protection[R]. Syracuse University, 2001:41-46. 被引量:1
  • 7Jelena Mirkovic.A user-centric metric for denial-of-service measurement[R].University of Delaware, 2007. 被引量:1
  • 8Johnson H, Qaisrani B, Fiedler M, et al. Hierarchical defense structure for mitigating DoS attacks [C]. Mauritius: Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006: 83-83. 被引量:1
  • 9NAOUMOV N, ROSS K. Exploiting P2P systems for DDoS attacks [ C ]//Proc of the 1 st International Conference on Scalable Information Systems. New York: ACM Press,2006. 被引量:1
  • 10DASWANI N, GARCIA-MOLINA H. Query flood DoS attacks in Gnutella networks [ C ]//Proc of the 9th ACM Conference on Computer and Communications Security. New York : ACM Press ,2002 : 181-192. 被引量:1

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部