首页 | 本学科首页   官方微博 | 高级检索  
     检索      

IPv6下DoS/DDoS SYN Flood入侵和攻击的检测
引用本文:张彦军,贾世国,薛晓敏.IPv6下DoS/DDoS SYN Flood入侵和攻击的检测[J].兰州理工大学学报,2008,34(2):104-107.
作者姓名:张彦军  贾世国  薛晓敏
作者单位:暨南大学,华文学院网络与教育技术中心,广东,广州,510632
摘    要:在网络安全状况划分的前提下,分析SYN Flood半连接攻击的形式和特点.为了防范这种使网络资源耗尽的攻击,提出Ipv6下跟踪三次握手的SYN Flood入侵和攻击的检测方法,对系统实现的数据结构进行设计与论证.最后在"一个广播的局域网"的问题规模下对该系统的有效性进行测试.结果表明,模拟检测系统能够将含错误数据的数据包丢弃,将分片的数据包重新组合成完整的数据包.

关 键 词:IPv6  DoS/DDoS攻击  SYNFlood  检测
文章编号:1673-5196(2008)02-0104-04
修稿时间:2007年10月31

Detection of intrusion and attack from SYN Flood with Ipv6
ZHANG Yan-jun,JIA Shi-guo,XUE Xiao-min.Detection of intrusion and attack from SYN Flood with Ipv6[J].Journal of Lanzhou University of Technology,2008,34(2):104-107.
Authors:ZHANG Yan-jun  JIA Shi-guo  XUE Xiao-min
Abstract:On the premise of divided network conditions in terms of its safety,the behaviour and characteristics of semi-joining attack of SYN Flood was analyzed.For guarding against this kind of attack which could make a network resources exhausted,a detection method was proposed,where the three-handshake intrusion and attack from SYN Flood was tracked with Ipv6.The data structure implemented by the system was also designed and proved.Finally a test for the usefulness of this system was conducted in connection with a local network of broadcasting.The result showed that,by using this simulation detection system,the defective data could be discarded and the remained scattered data could be recomposed into a complete data package.
Keywords:IPv6  denial of service/distributed denial of service attack  synchronize flood  detect
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号