首页 | 本学科首页   官方微博 | 高级检索  
     

DDoS攻击原理及对策研究
引用本文:黄智勇,沈芳阳,刘怀亮,林志,黄永泰,周晓冬.DDoS攻击原理及对策研究[J].计算机与现代化,2004(3):73-75,79.
作者姓名:黄智勇  沈芳阳  刘怀亮  林志  黄永泰  周晓冬
作者单位:1. 广州大学教务处,广东,广州,510405
2. 广东工业大学计算机学院,广东,广州,510090
3. 华南理工大学计算机学院,广东,广州,510640
4. 中山大学计算机系,广东,广州,510275
5. 西北工业大学管理学院,陕西,西安,710072
摘    要:先通过比较DoS与DDoS的概念,引入了DDoS攻击的原理,并介绍了DDoS攻击的常用工具,接着重点对DDoS攻击的对策进行了比较详细的讨论,讨论了DDoS攻击的监测,以及如何防御DDoS攻击等,最后对遭受DDoS攻击后的对策进行了研究。

关 键 词:网络安全  分布式拒绝服务  计算机网络  网络攻击  DDoS
文章编号:1006-2475(2004)03-0073-03

Research on Principle and Some Countermeasures of Attack of DDoS
HUANG Zhi-yong,SHEN Fang-yang,LIU Huai-liang,LIN Zhi,HUANG Yong-tai,ZHOU Xiao-dong.Research on Principle and Some Countermeasures of Attack of DDoS[J].Computer and Modernization,2004(3):73-75,79.
Authors:HUANG Zhi-yong  SHEN Fang-yang  LIU Huai-liang  LIN Zhi  HUANG Yong-tai  ZHOU Xiao-dong
Affiliation:HUANG Zhi-yong~1,SHEN Fang-yang~2,LIU Huai-liang~2,LIN Zhi~3,HUANG Yong-tai~4,ZHOU Xiao-dong~5
Abstract:This article introduces the principle of the attack of DDoS by comparing the concepts of DoS and DDoS in front and describes the ordinary tools of the attack of DDoS.Then the text pays much attention to discuss the countermeasures of DDoS in detail,including explaining how to inspect and defend the attack of DDoS,the countermeasures of DDoS are also studied at the end of this article.
Keywords:DoS  DDoS  TCP/IP  network security
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号