首页 | 本学科首页   官方微博 | 高级检索  
     

SYNFlood攻击原理、检测及防御
引用本文:孙辉,樊龙,马士友. SYNFlood攻击原理、检测及防御[J]. 电脑与微电子技术, 2012, 0(22): 51-53
作者姓名:孙辉  樊龙  马士友
作者单位:[1]四川大学计算机学院,成都610065 [2]中国人民解放军78046部队,成都610011 [3]防空兵学院,郑州450052
摘    要:通过描述TCP三次握手、TCP握手缺陷和IP欺骗,阐述SYNFlood攻击的基本原理。对比传统的SYNFlood攻击检测办法.提出牛顿均差插值检测法。介绍三种防御办法:修改系统配置和采用DDoS防火墙以及在边界路由设备上只允许合法源IP地址才能进入网络。

关 键 词:SYN  Flood攻击  TCP三次握手  TCP握手缺陷  IP欺骗  攻击检测

Principle,Detection and Defense of SYN Flood Attack
SUN Hui,FAN Long,MA Shi-you. Principle,Detection and Defense of SYN Flood Attack[J]. , 2012, 0(22): 51-53
Authors:SUN Hui  FAN Long  MA Shi-you
Affiliation:1. College of Computer, Sichuan University, Chengdu 610065 ; 2. 78046 Troops,PLA, Chengdu 610011 ; 3. Air Defense Forces Academy,Zhengzhou 450052)
Abstract:By describing TCP three-way handshake, TCP handshake defects and IP spoofing, it elaborates the basic principle of SYN Flood attack. Comparing with the traditional SYN Flood attack de- tection method, presents Newton mean difference interpolation assay. And introduces three de- fensive approaches: modifies the server's configuration, utilizes the DDoS firewall and only allow data packets with legitimate source IP address into network on the boundary routing device.
Keywords:SYN Flood Attack  TCP Three-Way Handshake  TCP Handshake Defects  IP Spoofing  Attack Detection
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号