期刊文献+

IP源地址伪造问题研究 被引量:1

Research on IP Address Forgery
下载PDF
导出
摘要 IP源地址伪造是Internet上多种攻击的基础.分析了IP源地址伪造的原理,深入探讨了与IP源地址伪造相关的攻击,并简述了其后果,给出了防御IP源地址伪造的方法和措施. Many kinds of attacks employ IP address forgery. This paper describes the principle of IP Address forgery, analyzes the attacks related to IP address forgery thoroughly, points out the consequences briefly and present measures to defend against IP address forgery.
出处 《重庆工学院学报》 2006年第11期59-61,共3页 Journal of Chongqing Institute of Technology
关键词 IP源地址伪造 原始套接字 DDOS 包过滤 IP address forgery SOCK-RAW DDOS packet filtering
  • 相关文献

参考文献4

二级参考文献11

  • 1.2000年国际十大计算机安全事件 [OL].http://tech.163.com/tm/ 001226/001226_12761.html.,.
  • 2刘杰 [OL].信息战攻防之间.http://cio.enet.com.cn/article/20021206/ 20021206225749_1.xml.,.
  • 3徐一丁.分布式拒绝服务攻击(DDoS)原理及防范 [OL].http://www -900.ibm.com/developerWorks/cn/security/se-ddos/index.shtml.,.
  • 4Polla D, McConnell J, Frincke D, et al . A framework for cooperative intrusion detection[A]. In: Proceedings of the 21st National Information Systems Security Conference[C]. Virginia, 1998. 361-373
  • 5Koutepas G, Stamatelopoulos F, Hatzigiannakis V, et al . An adaptable inter-domain infrastructure against DoS attacks[A]. In:Proceedings of the International Conference on Advances in Infrastructure for e-Business, e-Education, e-Science, e-Medicine, and
  • 6Moore D, Geoffrey M, Voelker. Inferring internet denial-of service activity[A]. In: Proceedings of the 10th USENIX Security Symposium[C]. Washington, D C, 2001
  • 7Giles K E, Marchette D J, Priebe C E. On the spectral analysis of backscatter data[A]. In: Proceedings of the Hawaii International Conference on Statistics, Mathematics, and Related Fields[C]. Hawaii, 2004
  • 8Mutaf P. Defending against a denial-of-service attack on TCP[A]. In: Proceedings of the 2nd International Workshop on Recent Advances in Intrusion Detection[C]. Indiana, 1999
  • 9Janakiraman R, Waldvogel M, Zhang Qi. Indra: A peer-to-peer approach to network intrusion detection and prevention[A]. In: Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises[C]. Linz, 2
  • 10Valdes A, Skinner K. Probabilistic alert correlation[A]. In: Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection[C]. Davis, 2001. 54-68

共引文献5

同被引文献3

引证文献1

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部