检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:李毅超[1] 王钰[1] 夏梦芹[1] 曾家智[1]
机构地区:[1]电子科技大学计算机科学学院,成都610054
出 处:《计算机科学》2003年第5期145-149,共5页Computer Science
摘 要:More and more serious network attack makes it more impending to find out the source of attacker. In thispaper,we analyze the status in development of methods such as ICMP traceback, marking packet, hop by hop, IPsecauthentication and connection chain. We also put forward the tendency of marked IP traceback.More and more serious network attack makes it more impending to find out the source of attacker. In this paper,we analyze the status in development of methods such as ICMP traceback, marking packet, hop by hop, IPsec authentication and connection chain. We also put forward the tendency of marked IP traceback.
关 键 词:网络安全 入侵检测系统 计算机网络 防火墙 伪装IP追踪技术
分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.15