期刊文献+

DDoS/DRDoS攻击的研究与设计 被引量:1

Research on DDoS/DDoS Attacks and Its Design
下载PDF
导出
摘要 DDoS攻击(包括DRDoS攻击)给网络安全带来了巨大的危害。为了阻止这类攻击,本文从分析当前DoS/DDoS攻击的原理入手,对DDoS/DRDoS攻击进行合理分类,即分为协议漏洞攻击、软件漏洞攻击和蛮力攻击三种。具体介绍了DRDoS攻击的程序实现,同时设计了可以进行这类攻击的攻击平台。 DDoS attack (including DRDoS attack) on the Internet has become a pressing problem. In this paper, we first analyze the principle of DoS/DDoS attacks, and then we update the classification of DDoS/DRDoS attacks, including 3 categories such as TCP/IP protocol vulnerabi!ities attacks, software vulnerabilities attacks and brute-force attacks. The programs of TCP-Syn attacks, UDP-Flood attacks, ICMP Ping attacks and DRDoS attacks are also given.
作者 於晓兰
出处 《武汉职业技术学院学报》 2008年第3期83-86,共4页 Journal of Wuhan Polytechnic
关键词 DDOS DRDOS 攻击 DDoS DRDoS attacks
  • 相关文献

参考文献1

二级参考文献1

共引文献5

同被引文献16

  • 1钟诚,杨锋,陈国良.基于概率模糊认知图的混合入侵检测方法[J].小型微型计算机系统,2006,27(5):783-787. 被引量:3
  • 2杨锋,钟诚,李智.基于概率模糊认知图的Mstream攻击检测方法[J].计算机工程,2006,32(10):125-127. 被引量:3
  • 3Li G, Hamilton H J. Basic association rules[ A ]. Proceedings 2004 SIAM International Conference on Data Mining (SDM' 04)[ C]. Lake Buena Vista: Soc had & Appl Math,2004. 166 - 177. 被引量:1
  • 4Wai Hoau,Chan K C C.Mining changes in association rules: A fuzzy approach[ J] .Fuzzy Sets and Systems,2005,14( 1 ) : 87- 104. 被引量:1
  • 5QIN XZ, LEE W. Discovering novel attack slrategies from IN- FOSEC alerts [ A ]. ESORICS 2004 [ C ]. Sophia Anfipolis: LNCS(3139) ,439 - 456. 被引量:1
  • 6Corporation Symantec. Symantec Global IntemetSecurity Threat Report Trends for 2008 [ EB/OL ]. http://eval, symantec, corn/ mktginfo/enterprise/white_ papers/b-whitepaper_ intemet_ se- curity_ threat_ report_ xiv_ 04-2009. en-us, pdf. 被引量:1
  • 7Peng Ning, Yun Cui, Douglas S. REEVES, DINGBANG XU. Techniques and tools for analyzing intrusion alerts [ J ]. ACM Transactions on Information and System Security, 2004,7 (2) : 274 - 318. 被引量:1
  • 8James M Keller, Jeffrey Osbom. Training the fuzzy integral [J]. International Journal of Approximate Reason, 2(102, 15 (1):1 -24. 被引量:1
  • 9王熙照.模糊测度和模糊积分及在分类技术中的应用[M].北京:科学出版社,2007. 被引量:1
  • 10Valdes Alfonso, Skinner Keith. Probabilistic alert correlation [ A]. Proceedings of the 4th International Symposium on Re-cent Advances in Intrusion Detection, 2001 [ C ]. London: Springer-Verlag, 2001.54 - 68. 被引量:1

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部