Attack tree modeling of distributed denial of service attack 反弹式拒绝服务攻击的研究与对策
Trace back algorithm for distributed denial of service attack 分布式拒绝服务型攻击原理及防范措施
distributed denial of service attacks and its precautionary measures 分布式拒绝服务攻击的网络跟踪算法
distributed denial of service attacks prevention and countermove 正态分布与分布式拒绝服务攻击的主动预防
distributed denial of service attack ( ddos ) is one of the dangers intrusion, the intrusion hide themselves through all kinds of ways, trace back is one of major hotspot of net security science 摘要分布式拒绝服务攻击通过控制多台傀儡机对目标机进行攻击,该类型攻击的攻击路径隐蔽,对攻击者跟踪困难。
Ids has been fast developing since it's put forward . but intrusion detection technology is now wandering with the universal application of high-speed network, the appear of new attack methods like distributed denial of service attack, and the low efficiency and high false positive of today's idss 但是,由于高速网络和交换式网络的普遍应用,以分布式拒绝服务攻击为代表的新型攻击方式的出现和发展,以及现有入侵检测系统效率低下、误报率和漏报率较高的问题无法得到有效解决等问题,目前入侵检测技术正处于发展的关键时期。
Two main methods are as follows : ( 1 ) using identity theft techniques like phasing to order expensive goods and bill them to some innocent person, then liquidating the goods for quick cash; ( 2 ) extortion by using a network of compromised " zombie " computers to engage in distributed denial of service attacks against the target web site until it starts paying protection money 二个主要方法是如下:(1)使用本身偷窃技术,喜欢分阶段定购昂贵的物品,然后把账单弄到那些无辜的人身上,最后物品清算为现金;(2)敲诈,通过使用妥协的"蛇神"计算机网络,来参与分布其取消服务来攻击那些反对的目标网站,直到它开始支付保护费。