检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]湖南大学软件学院,长沙410082 [2]广州大学计算机科学与教育软件学院,广州510006
出 处:《计算机应用研究》2009年第12期4744-4746,4750,共4页Application Research of Computers
基 金:IPv6环境下基于P2P的DDoS分布式防御研究(60673156)
摘 要:DDoS攻击传统的防御措施包括如防火墙、入侵检测系统等采取的是被动防御的策略,防御效果不够理想。采用主动防御策略的攻击源追踪技术,提出一种新的攻击源追踪模型,不需要AMS算法所要求的受害者预先具备上游拓扑数据的强假设前提。新的标记算法对标记过边信息的包不再重复标记,通过上游路由器的配合确认就能定位攻击源,与AMS算法和改进后的AEMS算法相比收敛速度更快,受标记概率和路径长度的影响更小、更稳定。The existing traditional countermeasures in defending against distributed denial-of-service (DDoS) attacks, such as firewall and intrusion detection system( IDS), can not do well only by passive defense policy. The essay pointed out a new IP traeeback model based on probabilistic packet marking, this model inherited the advantages of AMS, but it did not need the assumptions of having upstream topology by victim. The new algorithm did not mark the packet of having edge message again,it was much faster in convergence time and more stable, and had less influence by marking probability and the length by routing.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.149.27.125