期刊文献+

基于网络回声的跳板检测系统的设计与实现 被引量:1

Design and Implementation of Stepping Stone Detection System based on Net-echo
下载PDF
导出
摘要 为了克服传统跳板检测方式时间长、算法复杂度高、不能及时响应等缺点,文章提出一种在服务器端基于网络回声的跳板检测方案。文章详细描述了基于该方案实现的跳板检测系统,并通行理论分析、实验测试证明了在服务器端基于网络回声的跳板检测方案的可行性、准确性、高效性和高可靠性。 In order to overcome the disadvantages of traditional springboard detection, such as high time-cost, complicated algorithm, inefficiency in responses, this paper proposes a springboard detection method at the sever based on RTT. This paper describes the springboard detection system based on the method in detail, and proves the feasibility, accuracy, high efficiency and high reliability of the method by theoretical analysis and practical test.
出处 《信息网络安全》 2013年第9期41-48,共8页 Netinfo Security
基金 国家973计划前期研究专项[2011CB311801] 国家863计划高技术研究发展计划基金[2012AA012704] 河南省科技创新人才计划[114200510001]
关键词 流身份鉴别 网络回声 跳板检测 network flow identification net-echo stepping stone detection
  • 相关文献

参考文献30

  • 1Z. Zhu, G. Lu, Y. Chen, Z. J. Fu, P. Roberts, and K. Han.Botnet research survey[C] in Proceedings of the 32nd Annual IEEE International Computer Software and Applications ConferenceWashington, DC, USA, 2008. 被引量:1
  • 2张永铮,肖军,云晓春,王风宇.DDoS攻击检测和控制方法[J].软件学报,2012,23(8):2058-2072. 被引量:117
  • 3M. Abu Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A multi-faceted approach to understanding the bomet phenomenon[C].ser. IMC'06. ACM, 2006. 被引量:1
  • 4Staniford Chen, S. Heberlein, L.Holding Intruders Accountable on the lnternet[C].in Proceedings IEEE Symposium on Security and Privacy, OaHand, CA, USA, 1995.39-49. 被引量:1
  • 5Yang J, Huang S H S. Matching TCP/IP packets to detect stepping- stone intrusion[J]. International Journal of Computer Science and Network Security, 2006, 6(04):269-276. 被引量:1
  • 6Li P, Zhou W, Yu Y. A quick-response real-time stepping stone detection scheme[C].HPCC 2010: Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications. IEEE, 2012:677-682. 被引量:1
  • 7Shullich R, Chu J, Ji P, et al. A Survey of Research in Stepping-Stone Detection[J]. International Journal of Electronic Commerce, 2011, 2(2):103- 126. 被引量:1
  • 8Behrouz Forouzan.TCP/IP Protocol Suite (Second Edition)[M]. McGraw-Hill, New York, 2002. 被引量:1
  • 9Li P, Zhou W, Wang Y. Getting the real-time precise round- trip time for stepping stone detection[C].NSS 2010: Proceedings of the 4th International Conference on Network and System Security. IEEE, 2012.377-382. 被引量:1
  • 10J. c. Mogul and G. Minshall.Rethinking the TCP Nagle algorithm," SIGCOMM Comput. Commun. tkev. , 2001,(31):6-20. 被引量:1

二级参考文献14

共引文献138

同被引文献22

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部