首页 | 本学科首页   官方微博 | 高级检索  
     

基于自相似流量检测的DDoS攻击及防御研究
引用本文:黄长慧,王海珍,陈思. 基于自相似流量检测的DDoS攻击及防御研究[J]. 信息网络安全, 2014, 0(9): 69-71
作者姓名:黄长慧  王海珍  陈思
作者单位:公安部第一研究所,北京100048
摘    要:DDoS攻击是目前互联网中应用最广泛,也是危害性最大的一种攻击方式,以破坏网络服务的可用性为目标。文章首先介绍了DDoS的攻击原理,并重点对DDoS的攻击方式和基于自相似网络流量的DDoS攻击检测方式进行研究,最后针对目前DDoS攻击的防御方式进行了全面解析。

关 键 词:分布式攻击  防御措施

Research on DDoS Attack and Defense based on Network Self-similarity Detecting
HUANG Chang-hui,WANG Hai-zhen,CHEN Si. Research on DDoS Attack and Defense based on Network Self-similarity Detecting[J]. Netinfo Security, 2014, 0(9): 69-71
Authors:HUANG Chang-hui  WANG Hai-zhen  CHEN Si
Affiliation:(The First Research Institute of Ministry of Public Security, Beijing 100048, China)
Abstract:DDoS attack is a widely-used and most dangerous attack mode of Internet. It takes availability of network service as the target. This paper introduces the principle of DDoS attack, and focus on methods of network self-similarity in detecting DDoS Attack. Finally, the methods of DDoS attack are analyzed comprehensively.
Keywords:DDoS  DDoS  distributed attack  defense method
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号