Computer Science ›› 2020, Vol. 47 ›› Issue (11A): 396-401.doi: 10.11896/jsjkx.200100060
• Information Security • Previous Articles Next Articles
CHEN Xi, FENG Mei, JIANG Bo
CLC Number:
[1] JIN C,HAO Z Y,WU Z G.Principle and Defense Strategy of DNS Cache Poisoning Attack [J].China Communications,2009,6(4):17-22,75-81. [2] LARSEN M,GONT F.Transport Protocol Port Randomization Recommendations:RFC 6056[S].2010. [3] DAGON D,ANTONAKAKIS M,VIXIE P.Increased DNS Forgery Resistance Through 0x20-Bit Encoding[C]//Proceedings of ACM CCS'08.ACM Press,2008. [4] JU Y W,SONG K H,LEE E J,et al.Cache Poisoning Detection Method for Improving Security of Recursive DNS[C]//The 9th International Conference on Advanced Communication Techno-logy.Okamoto,Kobe,2007:1961-1965. [5] MUSASHI Y,KUMAGAI M,KUBOTA S,et al.Detection of Kaminsky DNS Cache Poisoning Attack[C]//2011 4th International Conference on Intelligent Networks and Intelligent Systems.Kunming,2011:121-124. [6] JIN Y,TOMOISHI M,MATSUURA S.A Detection MethodAgainst DNS Cache Poisoning Attacks Using Machine Learning Techniques:Work in Progress[C]//2019 IEEE 18th International Symposium on Network Computing and Applications (NCA).Cambridge,MA,USA,2019:1-3. [7] WANG P J.Design and implementation of a private DNS-oriented attack detection and response system [D].Harbin:Harbin Institute of Technology,2018. [8] Internet Governance Landscape Background Paper[EB/OL].(2010-08-11).http://www.intgovforum.org/cms/2010/Back ground/Chinese-IGF-Background-Paper.pdf. [9] DU W L.Remote DNS Cache Poisoning Attack Lab[EB/OL].(2016-12-11).https://seedsecuritylabs.org/Labs_16.04/PDF/DNS_Remote.pdf. [10] XU C X,HU R G,SHI F,et al.Research on defense strategy of cache poisoning in Kaminsky domain name system[J].ComputerEngineering,2013,39(1):12-17. [11] ZHANG W X,WU W Z,LIANG J Y,et al.Rough Set Theory and Method [M].Beijing:Science Press,2001. [12] KANDA Y,FONTUGNE R,FUKUDA K,et al.ADMIRE:Anomaly detection method using entropy-based PCA with three-step sketches[J].Computer Communications,2013,36(5):575-588. [13] TELLENBACH B,BURKHART M,SCHATZMANN D,et al.Accurate network anomaly classification with generalized entropy metrics[J].Computer Networks,2011,55(15):3485-3502. [14] LEE W,DONG X.Information-theoretic measures for anomaly detection[C]//Proc.of IEEE Symposium on Security and Privacy (S&P).Oakland:CA,2001. [15] MANIKOPOULOS C,PAPAVASSILIOU S.Network intrusion and fault detection:a statistical anomaly approach[J].IEEE Communications Magazine,2002,40(10):76-82. [16] LAKHINA A,CROVELLA M,DIOT C.Mining anomaliesusing traffic feature distributions[C]//Proc.of ACM SIGCOMM.Philadelphia:PA,2005. [17] SHU Y Z,MEI M Y,HUANG W Q,et al.Research on DDoS Attack Detection Based on Conditional Entropy in SDN Environment [J].Wireless Internet Technology,2016(5):75-76. [18] SUN Z X,LI Q D.DDoS Attack Prevention Strategies for Databases Based on Source and Destination IP Addresses [J].Journal of Software,2007(10):2613-2623. [19] PETR E.An Analysis of the DNS Cache Poisoning Attack[EB/OL].(2009-11-02).http://labs.nic.cz/files/labs/ DNS-cache-poisoning-attack-analysis.pdf. [20] WANG G.Research on Security of Domain Name System [D].Harbin:Harbin Institute of Technology,2007. |
[1] | MIAO Qi-guang, XIN Wen-tian, LIU Ru-yi, XIE Kun, WANG Quan, YANG Zong-kai. Graph Convolutional Skeleton-based Action Recognition Method for Intelligent Behavior Analysis [J]. Computer Science, 2022, 49(2): 156-161. |
[2] | HU Jian-wei,XU Ming-yang,CUI Yan-peng. Improved TLS Fingerprint Enhance User Behavior Security Analysis Ability [J]. Computer Science, 2020, 47(3): 287-291. |
[3] | CHEN Dan, WANG Xing, HE Peng and ZENG Cheng. Towards Understanding Existing Developers’ Collaborative Behavior in OSS Communities [J]. Computer Science, 2016, 43(Z6): 476-479. |
[4] | DONG Zhen-xing, ZHANG Qing and CHEN Long. Digital Forensic Investigation in Cloud Storage [J]. Computer Science, 2015, 42(Z11): 348-351. |
[5] | CHEN Qian, SHE Wei and YE Yang-dong. Method of Behavior Analysis for Complex System Based on Hierarchical Bayesian Petri Net with Time Factor [J]. Computer Science, 2015, 42(7): 62-67. |
[6] | HE Peng, LI Bing, YANG Xi-hui and XIONG Wei. Research on Developer Preferential Collaboration in Open-source Software Community [J]. Computer Science, 2015, 42(2): 161-166. |
[7] | LI Li-yao, SUN Lu-jing and YANG Jia-hai. Research on Online Social Network [J]. Computer Science, 2015, 42(11): 8-21. |
[8] | GUO Jun-xia,GAO Cheng,XU Nan-shan and LU Gang. User Behavior Analysis Based on Web Browsing Logs [J]. Computer Science, 2014, 41(3): 110-115. |
[9] | XU Jiu-cheng,ZHANG Ling-jun,SUN Lin and LI Shuang-qun. Reduction in Incomplete Hybrid Decision System Based on Generalized Neighborhood Relationship [J]. Computer Science, 2013, 40(4): 244-248. |
[10] | TENG Shu-hua,SUN Ji-xiang,ZHOU Shi-lin,LI Zhi-yong. Comparison with Attribute Reduction Algorithms in Information View [J]. Computer Science, 2011, 38(1): 259-263. |
[11] | LIU Wei,LIANG Ji-ye,WEI Wei,QIAN Yu-hua. Incremental Algorithm for Attribute Reduction Based on Conditional Entropy [J]. Computer Science, 2011, 38(1): 229-231. |
|