期刊文献+

基于策略系统的SYN Flooding攻击防御机制 被引量:2

Mechanism of Preventing SYN Flooding Attack Based on Policy System
在线阅读 下载PDF
导出
摘要 拒绝服务(denialofservice)攻击对网络带来的危害越来越严重,SYNFlooding攻击是DoS攻击中著名的一种。本文介绍了在网络测量平台上基于策略系统的SYNFlooding攻击防御机制。文章首先简单介绍了SYNFlooding的攻击原理、防御方法以及网络监测系统,然后对策略系统进行了讨论,最后详细阐述了网络测量平台上基于策略系统的SYNFlooding攻击检测和追踪工具的设计与实现,并进行了分析。 With the rapid development of network technology, the damage that brings by denial of service attacks to the network is becoming more serious. SYN flooding attack is a famous kind. In this paper a mechanism is introduced which prevents SYN flooding attacks based on the policy system upon the network measurement platform. Firstly, the principle and prevention of SYN flooding attack and the network measurement system are introduced in general. And then the policy system is addressed. Finally, the design and implementation of tools for detecting and tracing of SYN flooding attack which based on the policy system upon the network measurement platform are expatiated in detail, and some analyses are discussed.
出处 《电信科学》 北大核心 2004年第1期12-17,共6页 Telecommunications Science
基金 受国家高技术研究发展计划"863"基金(No.2001AA112090)资助
关键词 拒绝服务 SYN Flooding攻击 DOS攻击 防御机制 网络安全 denial of service, SYN flooding attack, network measurement, IP traceback
  • 相关文献

参考文献8

  • 1陈波,于泠.SYN Flooding攻击对策研究[J].计算机工程,2001,27(7):34-35. 被引量:9
  • 2蒋序平.[D].解放军理工大学,2003.
  • 3仇小锋.[D].解放军理工大学,2001.
  • 4颜学雄,王清贤,李梅林.SYN_Flooding攻击原理及预防方法[J].计算机应用,2000,20(8):41-43. 被引量:24
  • 5Savage S, Wetherall D, et al . Network support for IP traceback. IEEE/ACM Transactions on Networking, 2001, 9(3).
  • 6Douglas E C .Intemetworking with TCP/IP Volume 1: Principles, Protocols and Architectures (4th ed.). Pearson Education,2000.
  • 7Lupu E. A role-based framework for distributed system management. PhD Thesis, University of London, 1998.
  • 8Paxson V, Floyd S .Wide area traffic: the failure of poisson modeling. IEEE/ACM Transactions on Networking, 1995, 3(3): 226-244.

二级参考文献8

  • 1张小斌,黑客分析与防范技术,1999年
  • 2朱三元,网络通信软件设计指南,1993年
  • 3Stevens W R.TCP/IP Illustrated[]..1994
  • 4ZieglerR L.LinuxFirewalls[]..2000
  • 5SUN’’sTCP SYN FloodingSolutions. http://www.ciac.org/ciac/bulletins/ h-02.html . 1996
  • 6TCP SYN Flooding andIP SpoofingAttacks. CERT AdvisoryCA-96 . 1996
  • 7Denial ofServiceAttacking withTCP SYN Flooding. http://www.cert. org.tw . 2000
  • 8SchubaC L.Analisis of aDenial ofSeviceAttack onTCP[]..

共引文献30

同被引文献16

  • 1仇小锋,陈鸣.基于通用网络测量平台的反垃圾邮件技术[J].北京邮电大学学报,2004,27(6):45-49. 被引量:3
  • 2李丽,周文业,夏春和.网络测量技术研究[J].科技导报,2006,24(5):90-93. 被引量:2
  • 3潘飞,高岭.网络测量及其关键技术[J].计算机技术与发展,2006,16(7):99-101. 被引量:6
  • 4牛燕华,任新华,毕经平.Internet网络测量方式综述[J].计算机应用与软件,2006,23(7):11-13. 被引量:18
  • 5蔡志平.基于主动和被动测量的网络测量技术模型矛口算法研究[J].长沙:国防科学技术大学,2005.
  • 6CNCERT/CC.CNCERT/CC网络安全工作报告[EB/OL].http://www.itsec.gov.cn/webportal/down-load/2004-CERT-CC Report.pdf,2004.
  • 7NLANR/DAsT.Iperf[EB/OLl.Http://dast.nlanr.net/Projects/Iperf/,2007.
  • 8SAVAGE S.Sting:a TCP-based network measure-ment tool[J/OL].Http://www.CS.ucsd.edu/~sav-age/sting/papers/usits99.pdf,1999.
  • 9sAVAGE S,WETHERALL D,KARLIN A,et al.Network support for IP traceback[J].IEEE Trans on Networking,2001,1(3):226-237.
  • 10QIU Xiao-feng,HAO Ji-hong,CHEN Ming.A mechanism to defend SYN flooding attack based on network measurement systemiC].London:IEEE In-ternational Conference on Information Technology,Research and Education(ITRE)2004,2004.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部