首页 | 官方网站   微博 | 高级检索  
     

浅谈运营商异常流量清洗手段的部署和运用
引用本文:杨波,裴唯. 浅谈运营商异常流量清洗手段的部署和运用[J]. 计算机安全, 2014, 0(7): 40-45
作者姓名:杨波  裴唯
作者单位:中国电信湖南分公州,湖南长沙410016
摘    要:随着互联网的高速发展,其已经渗入到人们生活的方方面面,对经济和社会有着重大的影响。但近年来出现了大量的DDoS攻击事件,给互联网带来了很大冲击,严重影响了业务的可用性、用户的感知,以及给营运商造成了重大经济损失。在大流量的DDoS攻击面前,传统的安全防护设备显得那么无能为力,如何有效抵御DDoS攻击是每个运营商无法回避的难题。在深入分析DDoS攻击特征的前提下,探索性地将异常流量清洗设备引入到运营商的网络中,并成功防御了多次DDoS攻击事件,为解决难题指出了一条可行道路。

关 键 词:DDoS攻击  流量清洗

Deployment and Application of Operators to the Abnormal Flow Cleaning Method
YANG Bo,PEI Wei. Deployment and Application of Operators to the Abnormal Flow Cleaning Method[J]. Network & Computer Security, 2014, 0(7): 40-45
Authors:YANG Bo  PEI Wei
Affiliation:(China Telecom Hunan branch, Changsha, Hunan 410016, China)
Abstract:With the development of the Internet, it has infiltrated into every aspect of people's lives, has great influence on the economic and social. But in recent years, there has been a large number of DDOS attacks which has brought great impact to the Internet, seriously affect the usability, user service perception, as well as to the operators caused great economic loss. Facing the large flow of DDoS attacks, traditional security equipment seem so incapable of action, how to effectively protect against DDoS attacks is a large problem for every operator. In this paper, based on analysis of the DDoS attack features, ADS is introduced to the network operator, and the successful defense of a number of DDoS attacks, It offer a solution to solving the large problem.
Keywords:DDoS attack  flow cleaning
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号