期刊文献+

基于主机资源耗损分析防御DoS攻击的算法及实现 被引量:3

Implementation of new arithmetic for host computer about defense DoS attack
下载PDF
导出
摘要 随着计算机技术的迅速发展,DoS攻击成为主要的网络安全隐患。从分析主机资源耗损入手,提出了一种防御DoS攻击的一种算法。该算法通过分析系统CPU占用率来判断是否发生DoS攻击和进行DoS攻击的IP数据包,并进一步取缔非法占用的系统资源来保护主机能够正常工作。 With the development of computer science, DoS attack had become a ahidden danger in network. An new arithmetic is proposed to protect the resource of host computer. The arithmetic based on rate of CPU to judge if occurring DoS attack and IP data marker, so arithmetic terminate illegitimate impropriating to protect host computer.
机构地区 北京林业大学
出处 《计算机工程与设计》 CSCD 北大核心 2007年第5期1043-1044,1157,共3页 Computer Engineering and Design
关键词 主机 DOS攻击 阈值 CPU报警 攻击源 host computer, DoS attack threshold CPU's alarm fountainhead of attack
  • 相关文献

参考文献14

二级参考文献31

  • 1[1]Seti@Home. http://setiathome.ssl.berkely.edu
  • 2[2]Groove Networks website. http://www.groove.net
  • 3[3]CERT. http://www.cert.org/
  • 4[4]Gnutella. www.gnutella. com
  • 5[5]Yang B,Garcia-molina H.Designing a Super-Peer Network. In ICDE,2003
  • 6[6]Daswani N,Garcia-molina H.Query-Flood DoS Attacks in Gnutella. In ACM CCS, 2002
  • 7[7]Sripanidkulchai K.The Popularity of Gnutella Queries and Its Implications on Scalability. Featured on O'Reilly's) www.openp2p.com website,2001-02
  • 8[8]Daswani N,Garcia-molina H,Yang B.Open Problems in Data-sharing Peer-to-Peer Systems. In ICDT, 2003
  • 9[1]Scarpelli C. Tcp syn flooding and ip spoofing attacks [DB/OL ]. http://www. cert. ort/advisories/CA-1996-21. html.
  • 10[2]Savage S, Wetherall D, Karlin A, et al. Practical network support for ip traceback [ A ]. SIGCOMM2000[C]. Sweden: ACM, 2000. 295-300.

共引文献23

同被引文献18

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部