期刊文献+

基于令牌桶算法在抵御Flood攻击系统中的实现

Based on Token Barrel Algorithm of Realizing in Against Floods Attack
原文传递
导出
摘要 提出一种基于令牌桶算法的抵御Flood攻击的通信量整形模型和过滤规则,从硬件线路的改进着手对Flood攻击行为进行瓦解。 This paper presents a kind of algorithm based on token barrels to against floods attack with traffic plastic model and filtering rules,from the start of the hardware circuit improved to quickly eliminate flood attacks behavior.
作者 王建章
出处 《煤炭技术》 CAS 北大核心 2011年第5期200-202,共3页 Coal Technology
关键词 令牌 令牌桶算法 FLOOD攻击 分组 token the token barrel algorithm flood attack grouping
  • 相关文献

参考文献5

二级参考文献32

  • 1李仁发,李红,喻飞,徐成.入侵检测系统中负载均衡研究与仿真[J].系统仿真学报,2004,16(7):1444-1449. 被引量:9
  • 2卢开澄.计算机密码学[M].北京:清华大学出版社,2000..
  • 3Abbes T, Bouhoula A, Rusinowitch M. Protocol analysis in intrusion detection using decision tree[A]. Proceeding of the International Conference on Information Technology: Coding and Computing (ITCC'04) [C]. Los Alamitos, USA:IEEE Computer Society Press, 2004. 404-409.
  • 4Kruegel C, Toth T. Using decision trees to improve signature-based intrusion detection[A]. Proceeding of RAID'2003 [C]. Berlin Heidelberg New York: Springer-Verlag, 2003.173-191.
  • 5Erbacher R F, Frincke D. Visualization in detection of intrusions and misuse in large scale networks[A]. Proceeding of the International Conference on Information Visualization '2000[C]. Los Alamitos, USA: IEEE Computer Society Press, 2000. 294-299.
  • 6Spitzner L. The honeynet project: Trapping the hackers[J]. IEEE Security and Privacy, 2003, 1(2): 15-23.
  • 7Anderson J P.Computer security thread monitoring and surveillance[R]. Fort Washington, USA: James P Anderson Co, 1980.
  • 8Denning D E. An intrusion-detection model[J]. IEEE Transactions on Software Engineering, 1987, 13(2): 222-232.
  • 9Kahn C, Porras P, Staniford-Chen, et al. A common intrusion detection framework[EB/OL]. 1998. http:/www.isi.edu/gost/cidf/papers/cidf-jcs.ps.
  • 10Teng H S, Chen K, Lu S C. Security audit trail analysis using inductively generated predictive rules[A]. Proceeding of the Sixth Conference on Artificial Intelligence Applications[C]. Los Alamitos, USA: IEEE Computer Society Press, 1990. 24-29.

共引文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部