当前位置:主页>科 研>学术交流>

大流量分布式拒绝服务攻击的防御策略研究(6)


[14] Oikonomou G, Mirkovic J, Reiher P, Robinson M. A Framework for a Collaborative DDoS Defense[C]. Proceedings-Annual Computer Security Applications Conference. ACSAC, 2006, 33-42
[15] Rajesh Sharma, Krishan Kumar, Kuldip Singh, Joshi R C. Shared Based Rate Limiting: An ISP level Solution to Deal DDoS Attacks[C]. 2006 Annual IEEE India Conference (IEEE Cat. No. 06EX1372). New Delhi, India:IEEE,2006. 6-6
[16] Mirkovic J, Reiher P. D-WARD: Source-End Defense AgainstDistributed Denial-of-Service Attacks[J]. IEEE Transactions on Dependable and Secure Computing, 2005, 2(3):216-232
[17] El Defrawy K, Markopoulou A, Argyraki K. Optimal Allocation of Filters against DDoS Attacks[C]. 2007 Information Theory and Applications Workshop, Conference Proceedings, San Diego, CA, United state: Inst. of Elec. and Elec. Eng. Computer Society, 445 Hoes Lane - P.O.Box 1331, Piscataway, NJ 08855-1331, United States, 2007. 140-149
[18] Nagamalai Dhinaharan, Dhinakaran Cynthia, Lee Jae Kwang. Multi Layer Approach to Defend DDoS Attacks Caused by Spam[C]. Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007, Seoul, Korea, Republic of: Inst. of Elec. and Elec. Eng. Computer Society, 445 Hoes Lane - P.O.Box 1331, Piscataway, NJ 08855-1331, United States, 2007. 97-102
[19] Mark-aided distributed filtering by using neural network for DDoS defense[C]. GLOBECOM - IEEE Global Telecommunications Conference, St. Louis, MO, United states:Institute of Electrical and Electronics Engineers Inc., 3 Park Avenue, 17th Floor, New York, NY 10016-5997, United States,2005. 1701-1705
[20] Trostle J. Protecting Against Distributed Denial of Service (DDoS) Attacks Using Distributed Filtering[C]. 2006 SecureComm and Workshops [Second International Conference on Security and Privacy in Communication Networks and Workshops, Piscataway, NJ, USA:IEEE,2006. 201-211
[21] Yan J, Early S, Anderson R. The XenoService A Distributed Defeat for Distributed Denial of Service[C]. ISW 2000. Information Survivability Workshop. Third Information Survivability Workshop - ISW-2000. `Research Directions and Research Collaborations to Protect the Global Information Society, Piscataway, NJ, USA:IEEE,2000. 195-200
[22] Wang Xun, Chellappan Sriram, Boyer Phillip, Xuan Dong. On the effectiveness of secure overlay forwarding systems under intelligent distributed DoS attacks[J]. IEEE Transactions on Parallel and Distributed Systems, 2006,17(7):619-632
[23] Lin, Y T, et al. Design and implement of new object-oriented rule base management system[J]. Expert Systems with Applications, 2003,25:369–385.
[24] 黄洪宇, 林甲祥, 陈崇成, 樊明辉. 离群数据挖掘综述[J]. 计算机应用, 2006,8:8-13
[25] Ucla. Sanitized UCLA CSD traffic traces[OL],http://lever.cs.ucla.edu/ddos/traces/, 2006/2009
[26] MIT. 2000 DARPA Intrusion Detection Evaluation Data Set[OL], http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/index.html, 2000/2009
[27]Wang Dongqi, Chang Guiran, Feng Xiaoshuo. Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow[C]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Network and Parallel Computing - IFIP International Conference, NPC 2008, Proceedings, 2008,5245 LNCS:86-93
[28] Knorr E M, Ng R T, Tucakov V. Distance-based outliers: algorithms and applications[J]. VLDB Journal, 2000,8(3,4):237-253

(责任编辑:adminadmin2008)

分享到:

更多
发表评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
评价:
表情:
  • 微笑/wx
  • 撇嘴/pz
  • 抓狂/zk
  • 流汗/lh
  • 大兵/db
  • 奋斗/fd
  • 疑问/yw
  • 晕/y
  • 偷笑/wx
  • 可爱/ka
  • 傲慢/am
  • 惊恐/jk
用户名: 验证码:点击我更换图片
资料下载专区
图文资讯

容器是如何让“一切都是代码”成为现实的

容器是如何让“一切都是代码”成为现实的

现代应用的发展在很大程度上要归功于DevOps运动的蓬勃兴起以及该运动所产生的各种自动...[详细]

如何快速掌握一门新技术/语言/框架

如何快速掌握一门新技术/语言/框架

IT行业中的企业特点是都属于知识密集型企业。这种企业的核心竞争力与员工的知识和技能...[详细]

建高效数据中心有径可循

建高效数据中心有径可循

能耗问题一直是各大数据中心的心头之痛。有数据表明,2015年我国数据中心能耗预计将高...[详细]

2015黑帽大会:网络灾难后 重建IT安全

2015黑帽大会:网络灾难后 重建IT安全

在遭遇网络灾难后重建IT安全似乎是不可能完成的任务,但根据安全专家Christina Kubeck...[详细]

面对DNS劫持 企业移动应用该如何防护?

面对DNS劫持 企业移动应用该如何防护?

DNS(Domain Name System)劫持又称域名劫持,是指对正常的域名解析请求加以拦截,转而...[详细]

返回首页 返回顶部