期刊文献+

DDoS攻击原理与防御 被引量:3

The principle and defending of DDoS attack
下载PDF
导出
摘要 该文介绍了DDoS攻击原理和攻击过程,从预防、检测和响应3个方面分析了防御DDoS攻击的技术和方法,阐述了几种较为典型的应用。最后,针对目前DDoS攻击防御研究现状提出了防御攻击的方法和建议。 Described the principle and process of distributed denial of service attack, the methods and technologies that prevention, detection and respond of DDoS attack were analyzed, and then elaborated some kinds of relatively typical applications, Finally according to the development of the defending DDoS attack some methods and suggestions are proposed.
机构地区 西安通信学院
出处 《计算机安全》 2008年第7期93-95,共3页 Network & Computer Security
关键词 DDOS攻击 防御 检测 响应 DDoS attack defend detect respond
  • 相关文献

参考文献4

  • 1孙知信,李清东.路由器端防范DDos攻击机制综述[J].南京邮电大学学报(自然科学版),2007,27(1):89-96. 被引量:8
  • 2郑显举..DDoS攻击分析和防御方法[D].电子科技大学,2005:
  • 3陈刚..DDoS攻击的对策研究[D].西安电子科技大学,2005:
  • 4郑成兴著..网络入侵防范的理论与实践[M].北京:机械工业出版社,2006:256.

二级参考文献49

  • 1孙知信,唐益慰,程媛.基于改进CUSUM算法的路由器异常流量检测[J].软件学报,2005,16(12):2117-2123. 被引量:27
  • 2MIRKOVIC J,PRIER G,REIHER P.Attacking DDoS at the Source[C]// Proceedings 10th IEEE International Conference,2002:312-321. 被引量:1
  • 3MIRKOVIC J,PRIER G,REIHER P.Source-end DDoS Defense[C]// Network Computing and Applications,2003:171-178. 被引量:1
  • 4MIRKOVIC J,REIHER P.D-WARD:a source-end defense against flooding denial-of-service attacks[J].Dependable and Secure Computing,2005,2(3):216-232. 被引量:1
  • 5KANG Jian,ZHANG Zhe,JU Jiu bin.Protect e-commerce against DDoS attacks with improved D-WARD detection system[C]// IEEE International Conference,2005:100-105. 被引量:1
  • 6BASSEVILLE M,NIKIFOROV I V.Detection of Abrupt Changes[J].Theory and Application,1993,14:23-29. 被引量:1
  • 7BRODSKY B E,DARKHOVSKY B S.Non-parametric Methods in Change point Problems[J].Kluwer Academic,1993,23:46-52. 被引量:1
  • 8KENT S,R Atkinson.Security architecture for the Internet protocol[C]// Preiodical Issue-Article,1998:42-60. 被引量:1
  • 9KENT S,ATKINSON R.IP authentication header[S].The IP Security Protocol Working Group,1998. 被引量:1
  • 10FERGUSON P,SENIE D.Network ingress filtering:defeating denial of service attacks which employ IP source address spoofing[S].RFC2267,1998. 被引量:1

共引文献7

同被引文献14

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部