期刊文献+

基于TCP缓存的移动Ad Hoc网络DoS攻击防御体系构建

Construction of TCP cache based defense system for mobile Ad Hoc network to resist DoS attack
下载PDF
导出
摘要 移动Ad Hoc网络是一种无线移动自组网,虽然Ad Hoc网络的组网自由且容易实现,但是仍然难免遇到来自网络外的攻击。为了对Do S攻击进行防御,提出一种基于TCP缓存的移动Ad Hoc网络Do S攻击防御体系的构建,主要通过建立数据模型,运用TCP缓存检测算法防御Do S攻击。经过验证此算法运算合理,很好地达到了设计的要求。 The networking of mobile Ad Hoc network is free and easy to be implemented,but it is still inevitable to be attacked by the network outside. To defense the Do S attack,a construction of TCP cache based defense system for mobile Ad Hoc network is proposed,and the TCP cache detection algorithm is used to defend Do S attack by establishing the data model. The verification results show that the operation of the algorithm is reasonable,and can meet the design requirements well.
出处 《现代电子技术》 北大核心 2016年第17期79-81,共3页 Modern Electronics Technique
关键词 AD HOC DO S TCP缓存 攻击 防御 Ad Hoc DoS TCP cache attack defense
  • 相关文献

参考文献5

二级参考文献17

  • 1陈雷霆,张亮.人工免疫机制在木马检测系统中的应用研究[J].电子科技大学学报,2005,34(2):221-224. 被引量:11
  • 2Moore D, Voelker G, Savage S. Inferring Internet Denial of Service Activity[C]//Proc. of the 10th Conference on USENIX Security Symposium. Washington D. C., USA:[s. n,], 2001. 被引量:1
  • 3国家计算机网络应急技术处理协调中心.CNCERT/CC2007年网络安全工作报告[Z].(2008-04-08).http://www.cert.org.cn/UserFiles/File/CNCERTCC2007AnnualReportChinese.paf. 被引量:1
  • 4Houle K J, Weaver G M, Long N, Trends in Denial of Service Attack Technology[Z]. (2001-10-02). http://www.cert.org/archive/pdf/ DoS trends.pdf,. 被引量:1
  • 5P Papadimitratos,Z J Haas.Secure Routing for Mobile Ad Hoc Networks[A].SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS),San Antonio,TX,January,2002 被引量:1
  • 6L Zhou,Z J Haas.Securing Ad Hoc Networks.IEEE Networks[J].November/December,1999,13(6):24~30 被引量:1
  • 7Y Zhang,W Lee.Intrusion Detection in Wireless Ad Hoc Networks.ACM MOBICOM,2000 被引量:1
  • 8GUEVARA NOUBIR, GUOLONG LIN. Poster: Low-Power DoS Attacks in Data Wireless LANs and Countermeasures [ J ]. USA. ACM SIGMOBILE Mobile Computing and Cornmunieations Review,2003,7 (3): 29- 30. 被引量:1
  • 9BROWN T X, JAMES J E, SETHI A. Jamming and Sensing of Encrypted Wireless Ad Hoc Networks [ C ]//Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing,2006(5) ~ 120 - 130. 被引量:1
  • 10XU W, TRAPPE W, ZHANG Y, et al. The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks [ C ]// USA: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, 2005 : 46 - 57. 被引量:1

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部