期刊文献+

基于流量与可用资源的DDoS检测系统研究

On Traffic and Available Resources Based DDoS Detection
下载PDF
导出
摘要 近年来随着互联网技术的大规模社会化应用,网络安全也越来越受到关注。作为一种严重的网络威胁,分布式拒绝服务(DDoS)攻击一直为人们所关注。通过流量分析与可用资源检测的双层判别,对DDoS进行有效检测,将实现对DDoS检测的多元化。 In recent years,with a large-scale application of Internet,the relationship between daily life and network is becoming closer and closer.Network security has been the focus of research.As a serious threat,Distributed Denial of Service(DDoS) has already been a concern.An approach that analyses traffic and available resources will be effective in detecting DDoS.And it will be a complement of DDoS detection.
作者 郑明明 梁鸿
出处 《常州工学院学报》 2010年第6期48-51,共4页 Journal of Changzhou Institute of Technology
关键词 分布式拒绝服务 流量分析 可用资源检测 DDoS traffic available resources
  • 相关文献

参考文献18

  • 1国家互联网应急中心.中国互联网网络安全报告(2010年上半年)[R],2010. 被引量:1
  • 2魏蔚..基于流量分析与控制的DDoS攻击防御技术与体系研究[D].浙江大学,2009:
  • 3孙知信,姜举良,焦琳.DDOS攻击检测和防御模型[J].软件学报,2007,18(9):2245-2258. 被引量:34
  • 4徐图..超球体多类支持向量机及其在DDoS攻击检测中的应用[D].西南交通大学,2008:
  • 5Takuo Nakashima,Shunsuke Oshima.A Detective Method for SYN Flood Attacks[C]//First International Conference on Innovative Computing,Information and Control-Volume(ICICIC′06),IEEE Computer Society,2006:48-51. 被引量:1
  • 6John Elliott.Distributed Denial of Service Attacks and the Zombie Ant Effect[J].IT Prfessional,2000,2(2):55-57. 被引量:1
  • 7连一峰,王航编著..网络攻击原理与技术[M].北京:科学出版社,2004:431.
  • 8Glenn Carl,George Kesidis,Richard R Brooks,et al.Denial-of-Service Attack-Detection Techniques[J].IEEE Internet Computing,2006,10(1):82-89. 被引量:1
  • 9Sanjeev Kumar.Smurf-based Distributed Denial of Service(DDoS) Attack Amplification in Internet[C]//Second International Conference on Internet Monitoring and Protection(ICIMP 2007),IEEE Computer Society,2007. 被引量:1
  • 10曹爱娟,刘宝旭,许榕生.抵御DDoS攻击的陷阱系统[J].计算机工程,2004,30(1):10-13. 被引量:14

二级参考文献16

  • 1孙知信,唐益慰,程媛.基于改进CUSUM算法的路由器异常流量检测[J].软件学报,2005,16(12):2117-2123. 被引量:27
  • 2孙知信,唐益慰,张伟,宫婧,王汝传.基于特征聚类的路由器异常流量过滤算法[J].软件学报,2006,17(2):295-304. 被引量:15
  • 3[1]Harrison A. The Denial-of-service Attack Aftermath. http://www.cnn. com/2000/TECH/computing /02/14/dos.aftermath.idg, 2000 被引量:1
  • 4[2]Power R. 2001 CSI/FBI Computer Crime and Security Survey. Technical Report, Computer Security Institute, 2001 被引量:1
  • 5[3]Stein L D, Stewart J N. The World Wide Web Security FAQ-Version 3.1.2. http://www.w3.org/Security/Faq/, 2002-02 被引量:1
  • 6[4]Paxson V. An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks. Computer Communication Review, 2001,31(3) 被引量:1
  • 7[5]Cisco Systems, Inc. Cisco Security Advisory: 7xx Router Password Buffer Overflow. http://www.cisco.com/warp/public/770/pwbuf-pub. shtml, 1998-07 被引量:1
  • 8[6]Huegen C A. The Latest in Denial of Service Attacks: Smurfing Des- cription and Information to Minimize Effects. White Paper, 2000-02 被引量:1
  • 9[7]CERT Coordination Center. CA-1999-17: Denial of Service Tools.http: //www.cert.org/advisories/CA-2000-01.html. 被引量:1
  • 10[8]Cisco Systems Inc.. Defining Strategies to Protect Against TCP SYN Denial of Service Attacks. Http://www.cisco.com/warp/public/707/4. Html, 1999-07 被引量:1

共引文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部