首页 | 官方网站   微博 | 高级检索  
     

网络攻击追踪技术性能分析
引用本文:王燕.网络攻击追踪技术性能分析[J].计算机应用与软件,2011,28(2).
作者姓名:王燕
作者单位:浙江警官职业学院信息技术与管理系,浙江,杭州,310018
摘    要:DoS攻击(拒绝服务攻击)和DDoS攻击(分布式拒绝服务攻击)IP追踪目前成为当今网络安全领域中最难解决的问题,IP追踪系统目的是在数据包源地址非真时识别出IP数据包源地址.对一些解决该问题最有前景的追踪技术进行了比较,以寻找更有效方法,并提出了一个新的IP追踪系统,该系统能够只用一个数据包就可以实现追踪而不需要受害者数据包.

关 键 词:拒绝服务攻击  分布式拒绝服务攻击  IP追踪  伪造地址

PERFORMANCE ANALYSIS ON TECHNIQUES OF TRACING NETWORK ATTACKS
Wang Yan.PERFORMANCE ANALYSIS ON TECHNIQUES OF TRACING NETWORK ATTACKS[J].Computer Applications and Software,2011,28(2).
Authors:Wang Yan
Affiliation:Wang Yan(Department of Information Technology and Management,Zhejiang Police Vocational Academy,Hangzhou 310018,Zhejiang,China)
Abstract:Nowadays,IP traceback against DoS(Denial of Service) and DDoS(Distributed Denial of Service) attacks becomes the most difficult problem in internet security area.The aim of IP traceback system is to identify the source address in IP packets when the origin of a packet is spoofed.In this paper we compared a couple of most promising tracing techniques in order to find more effective methods.A new IP traceback system was proposed here,in which by using just one packet the tracing can be realized without victim...
Keywords:DoS DDoS IP traceback Spoofing  
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号