期刊文献+

状态协议分析技术在TCP中的应用 被引量:7

Application of Protocol Status Analysis Technique in Attack of TCP
在线阅读 下载PDF
导出
摘要 入侵检测系统已经日益成为网络安全系统的重要组成部分,成为网络安全必不可少的的一部分。其核心技术就是针对攻击所采用的检测技术。就目前而言网络攻击以拒绝服务攻击居多,而拒绝服务攻击大多数都与TCP相关,因此,应根据TCP的有关特性设计出相应的检测方法。文中介绍了TCP报文的封装情况、TCP报文段格式规定和TCP连接中的“三次握手”协议。然后在此基础上,从状态协议分析的角度出发,对与TCP相关的“TCP SYN洪水”攻击进行描述,并提出了相应的解决办法。 Intrusion detection system(IDS) is becoming more and more important in network security system. The detecting technique is the kernel of IDS. The denial of service(DoS) attack is the main attack of the network attacks. Most of DoS attacks is a TCP attack. So it is necessary to design the detecting measuras according to the attributes of the TCP. The specification of TCP as well as its three way handshake is introduced in the paper. Based on protocol status analysis, some TCP attack cases are studied and the corresponding countermeasures is presented.
出处 《计算机技术与发展》 2006年第3期211-212,216,共3页 Computer Technology and Development
关键词 状态协议分析 入侵检测 传输层控制协议 ,protocol status analysis intrusion detection transfer control protocol
  • 相关文献

参考文献5

二级参考文献26

  • 1CHRISTIAN KURMANN,FELIX RAUCH,THOMAS M STRICKER.Speculative Defragmentation-Leading Gigabit Ethernet to True ZeroCopy Communication
  • 2Thomas H Ptacek,Timothy N Newsham. Insertion,Evasion,and Denial of Service :Eluding Network Intrusion Detection[J].Secure Networks,1998
  • 3Christopher Kruegel, Fredrik Valeur, Giovanni Vigna et al.Stateful Intrusion Detection for High-Speed Networks. Reliable Software Group University California
  • 4Mike Fisk,George Varghese. Fast Content-Based Packet Handling for Intrusion Detection[R].UCSD Technical Report CS2001-0670,2001-05
  • 5ALESSANDRO RUBINI ,JONATHAN CORBET.LINUX DEVICEDRIVERS[M].O'Reilly & Associates,2001
  • 6胡希明 毛德操.LINUX内核源代码情景分析[M].浙江大学出版社,2001..
  • 7Dan Gusfield. Algorithms on Strings,Trees,and Sequences:Computer Science and Computational Biology[M].University of California Press,CA, 1997
  • 8Anil Buntwal Somayaji,Stephanie Forrest. Automated Response Using System-Call Delays[C].In:the 9th USENIX Security Symposium,2000-08:14~17
  • 9[1]Allen J et al.State of the Practice of Intrusion Detection Technologies[R].TECHNICAL REPORT,CMU/SEI-99-TR-028,Carnegie Mellon University, Software Engineering Institute, 2000
  • 10[2]Ptacek T H,Newsham T N.Insertion,Evasion,and Denial of Service:EludingNetwork Intrusion Detection.http:∥www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html , 1998

共引文献28

同被引文献35

引证文献7

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部