Computer Science ›› 2013, Vol. 40 ›› Issue (9): 99-102.
Previous Articles Next Articles
ZHANG Ming-qing,CHUAI Ying-cai,TANG Jun and KONG Hong-shan
[1] 严芬,高玉龙,殷新春.DDoS攻击检测进展研究[J].苏州大学学报:自然科学版,2011,7(13):35-41 [2] Peng T.Detecting reflector attacks by sharing beliefs[J].IEEE Global Telecommunication Conference,2003,6:1358-1362 [3] Jin C,Wang H,Shin K,et al.An effective defense againstspoofedtraffic[C]∥ACM International Conference on Computerand Communications Confercnce Security.2003,0:30-41 [4] Noureldien N A,Osinan I M.A stateful inspection module architecture[C]∥IEEE/RENCON.2000,2:259-265 [5] Tsunoda H,Ohm K,Yamamoto A,et al.Detecting DDoS attacks by a simple response packet confirmation mechanism[J].Computer Communications,2008:3299-3306 [6] 何雪妮.一种改进的DRDoS检测算法[J].自动化与仪器仪表,2012,1(3):150-151,5 [7] Wang Hai-ning,Jin Cheng,Shin K G.Defense against spoofed IP traffic using hop-count filtering[J].IEEE/ACM Trans on Networking,2000,15(1):40-53 [8] 张永花,崔永君.DRDoS攻击及其防御技术研究[J].计算机安全,2009,4:53-55 [9] Mitzenmacher M,Upfal E.Probability and Computing,Rando-mized Algorithms and Probabilitic Analysis[M].Cambridge:Cambridge University Press,2005:217-223 |
No related articles found! |
|