期刊文献+

拒绝服务(DOS)攻击方法及防范措施 被引量:1

The attacking method and the defense strategies of Denial Of Service
下载PDF
导出
摘要 随着计算机应用范围的逐渐扩大,人们从中获得了更多的方便与快捷。但由于黑客对网络破坏行为的增多,网络安全就成为了人们异常关心并且亟待解决的问题。主要对入侵检测系统进行了介绍,并对网络中常见的攻击进行了分类,而对其中存在时间最长、破坏力最广的DOS攻击进行了深入地研究,对其可采用的防范措施进行了理论分析和实践。 With the gradual enlargement of the range of application of computer, people have got more convenience and swift from it. But because the increasing of the destruction to network from the hackers, network security becomes people unusually care about and to be solved problem urgently. The text introduces IDS (Intrusion Detection System), classifies the common attack of the network, and gives the further study on Denial of Service (DOS) that appears time more early and has comparatively common attack form, and studies the defense strategies of Denial of service. The theory has been put into practic4e.
作者 陈思
出处 《应用能源技术》 2008年第11期46-47,共2页 Applied Energy Technology
关键词 入侵检测系统 网络安全 Intrusion detection system network security
  • 相关文献

同被引文献8

  • 1Deering S, Cheriton D. Multicast routing in datagram internetworks and extended LANs[J]. ACM Transactions on Computer Systems, 1990, 8(2): 85-110.
  • 2Ratnasamy S, Ermolinskiy A, Shenker S. Revisiting IP multicast[C]. In Proceedings of ACM Sigcomm, Pisa, Italy, 2006.
  • 3IETF Multicast Security (MSEC) working group, http://www. ietf. org/html. charters/msec-charter. html.
  • 4Holbrook H, Cheriton D. IP multicast channels: express support for single-source multicast applications[C]. In Proceedings of ACM Sigcomm, Cambridge, MA, 1999.
  • 5IETF Source-Specific Multicast (SSM) working group, http ://www. ietf. org/html. charters/ssm-charter. html.
  • 6高永仁.拒绝服务攻击及防御措施[J].信息技术,2009,33(3):85-87. 被引量:1
  • 7袁薇.拒绝服务攻击DoS的研究与防范[J].电脑与信息技术,2009,17(3):67-69. 被引量:1
  • 8章建国,陈欢.DDoS硬件防火墙技术研究[J].信息网络安全,2010(12):28-29. 被引量:2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部