期刊文献+

针对HTTP协议的LDOS攻击建模与评估

在线阅读 下载PDF
导出
摘要 低速率拒绝服务攻击主要是利用系统的协议漏洞,通过发送少量攻击数据包就可耗尽受攻击者可用资源,隐蔽性很高。对迭代服务器所建立的攻击模型进行了优化与改进。通过攻击评价指标,在NS2仿真软件下分析了攻击模型中各参数与性能之间的关系。
作者 赵阳 许晓东
出处 《软件导刊》 2017年第3期149-152,共4页 Software Guide
作者简介 赵阳(1992-),女,江苏泰州人,江苏大学计算机科学与通信工程学院硕士研究生,研究方向为网络安全; 许晓东(1965-),男,福建福州人,江苏大学计算机科学与通信工程学院教授,研究方向为网络测量和行为学理论与技术。
  • 相关文献

参考文献3

二级参考文献28

  • 1KUZMANOVIC A, KNIGHTLY E. Low-rate TCP-targeted denial of service attacks and counter strategies [J]. IEEE/ACM Transactions on Networking, 2006, 14 (4) : 683 - 696.
  • 2POSTEL J. Internet RFC 793, Transmission control[EB/OL]. [1981-09-18]. http://www.faqs. org/rfcs/ rfc793.html.
  • 3SHEVTEKAR A, KARUNAKAR A, ANSARI N. Low rate TCP denial-of-service attack detection at edge routers [J]. IEEE Communications Letters, 2005, 9 (4): 363- 365.
  • 4LUO X, CHANG R K C. On a new class of pulsing denial-of-service attacks and the defense [C] //Proceeding Network and Distributed System Security Symposium. San Diego: Internet Society, 2005. 67- 85.
  • 5CHEN Y, KWOK Y K, HWANG K. Filtering shrew DDoS attacks using a new frequency-domain approach[C]//Proceeding of IEEE Conference on Local Computer Networks. Tampa:IEEE, 2005 : 786 - 793.
  • 6SUN H, LUI J C S, YAU D K Y. Defending against low-rate TCP attacks: dynamic detection and protection[C] // Proceeding of IEEE International Conference on Network Protocols. Berlin, IEEE. 2004:196- 205.
  • 7SARAT S, TERZIS A. On the effect of router buffer sizes on low-rate denial of service attacks [C]//Proceeding of International Conference on Computer Communications and Networks. San Diego: IEEE, 2005:281-286.
  • 8TSAO J, EFSTATHOPOULOS P. Low-rate TCP-targeted denial of service attack defense[EB/OL]. [2003-09-18]. http://www.cs. ucla. edu/-pefstath/ papers/lowrate.pdf.
  • 9YANG G, GERLA M, SANADIDI M P. Defense against low-rate TCP targeted denial-of-service attacks[C]//Proceeding of International Symposium on Computers and Communications. Alexandria: IEEE, 2004:345-350.
  • 10HUSSAIN A, HEIDEMANN J, PAPADOPOULOS C. Distinguishing between single and multi-source attacks using signal processing [J]. Computer Networks, 2004, 46(4) : 479 - 503.

共引文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部