首页 | 本学科首页   官方微博 | 高级检索  
     

常见网络攻击方法及其对策研究
引用本文:霍宝锋,刘伯莹,岳兵,谢冰.常见网络攻击方法及其对策研究[J].计算机工程,2002,28(8):9-11,216.
作者姓名:霍宝锋  刘伯莹  岳兵  谢冰
作者单位:天津大学管理学院,天津300072
基金项目:天津市青年科学基金资助
摘    要:综合叙述了常见的网络攻击方法,对探针、拒绝服务、R2L、U2R、数据5大类攻击方法进行了分析,并对SYN Floogding、DDoS、IP spofing 、Trojan、缓冲区溢出(Buffer-overflows)、TCP劫持等重要的攻击方法进行了具体的分析研究,最后,提出了“基于审计记录的入侵检测模型”作为网络安全攻击的对策。

关 键 词:网络攻击  对策  计算机网络  入侵检测系统  网络安全  防火墙
文章编号:1000-3428(2002)08-0009-03

Research on Network Attacks and Security Countermeasures
HUO BaofengLIU BoyingYUE BingXIE Bing,.Research on Network Attacks and Security Countermeasures[J].Computer Engineering,2002,28(8):9-11,216.
Authors:HUO BaofengLIU BoyingYUE BingXIE Bing  
Affiliation:Management Information System DepartmentSchool of ManagementTianjin University300072
Abstract:A survey of the common network attacks are presented and five kinds of attacks include Probe,DoS,R2L,U2R and Data attacksare analysed.Some important attacks such as SYN Flooding,DDoS,IP spoofing,Trojan,Buffer_overflow and TCP hijack are researched particularly. Finally, as a countermeasure,the intrusion-detection model based on audit record is proposed in detail. ;;;
Keywords:Network securityAttacksIntrusion-detection modelAudit record  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号