[1]胡吉明 刘少君.状态协议分析技术在TCP中的应用[J].计算机技术与发展,2006,(03):211-212.
 HU Ji-ming,LIU Shao-jun.Application of Protocol Status Analysis Technique in Attack of TCP[J].,2006,(03):211-212.
点击复制

状态协议分析技术在TCP中的应用()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2006年03期
页码:
211-212
栏目:
应用开发研究
出版日期:
1900-01-01

文章信息/Info

Title:
Application of Protocol Status Analysis Technique in Attack of TCP
文章编号:
1005-3751(2006)03-0211-02
作者:
胡吉明 刘少君
河海大学计算机及信息工程学院
Author(s):
HU Ji-ming LIU Shao-jun
College of Computers & Information Engineering, Hohai University
关键词:
状态协议分析入侵检测传输层控制协议
Keywords:
protocol status analysisintrusion detection transfer control protocol
分类号:
TP393.08
文献标志码:
A
摘要:
入侵检测系统已经日益成为网络安全系统的重要组成部分,成为网络安全必不可少的的一部分。其核心技术就是针对攻击所采用的检测技术。就目前而言网络攻击以拒绝服务攻击居多,而拒绝服务攻击大多数都与TCP相关,因此,应根据TCP的有关特性设计出相应的检测方法。文中介绍了TCP报文的封装情况、TCP报文段格式规定和TCP连接中的“三次握手”协议。然后在此基础上,从状态协议分析的角度出发,对与TCP相关的“TCP SYN洪水”攻击进行描述,并提出了相应的解决办法
Abstract:
Intrusion detection system(IDS) is becoming more and more important in network security system. The detecting technique is the kernel of IDS. The denial of service(DoS) attack is the main attack of the network attacks. Most of DoS attacks is a TCP attack. So it is necessary to design the detecting measuras according to the attributes of the TCP. The specification of TCP as well as its three way handshake is introduced in the paper. Based on protocol status analysis, some TCP attack cases are studied and the corresponding countermeasures is presented

相似文献/References:

[1]李雷 丁亚丽 罗红旗.基于规则约束制导的入侵检测研究[J].计算机技术与发展,2010,(03):143.
 LI Lei,DING Ya-li,LUO Hong-qi.Intrusion Detection Technology Research Based on Homing - Constraint Rule[J].,2010,(03):143.
[2]马志远,曹宝香.改进的决策树算法在入侵检测中的应用[J].计算机技术与发展,2014,24(01):151.
 MA Zhi-yuan,CAO Bao-xiang.Application of Improved Decision Tree Algorithm in Intrusion Detection System[J].,2014,24(03):151.
[3]高峥 陈蜀宇 李国勇.混合入侵检测系统的研究[J].计算机技术与发展,2010,(06):148.
 GAO Zheng,CHEN Shu-yu,LI Guo-yong.Research of a Hybrid Intrusion Detection System[J].,2010,(03):148.
[4]林英 张雁 欧阳佳.日志检测技术在计算机取证中的应用[J].计算机技术与发展,2010,(06):254.
 LIN Ying,ZHANG Yan,OU Yang-jia.Application of Log Testing Technology in Computer Forensics[J].,2010,(03):254.
[5]李钦 余谅.基于免疫遗传算法的网格入侵检测模型[J].计算机技术与发展,2009,(05):162.
 LI Qin,YU Liang.Grid Intrusion Detection Model Based on Immune Genetic Algorithm[J].,2009,(03):162.
[6]黄世权.网络存储安全分析[J].计算机技术与发展,2009,(05):170.
 HUANG Shi-quan.Analysis of Network Storage's Safety[J].,2009,(03):170.
[7]李睿 肖维民.基于孤立点挖掘的异常检测研究[J].计算机技术与发展,2009,(06):168.
 LI Rui,XIAO Wei-min.Research on Anomaly Intrusion Detection Based on Outlier Mining[J].,2009,(03):168.
[8]胡琼凯 黄建华.基于协议分析和决策树的入侵检测研究[J].计算机技术与发展,2009,(06):179.
 HU Oiong-kai,HUANG Jian-hua.Intrusion Detection Based on Protocol Analysis and Decision Tree[J].,2009,(03):179.
[9]汪世义.基于优化支持向量机的网络入侵检测技术研究[J].计算机技术与发展,2009,(07):177.
 WANG Shi-yi.Network Intrusion Detection Based on Improved Support Vector Machine[J].,2009,(03):177.
[10]薛俊 陈行 陶军.一种基于神经网络的入侵检测技术[J].计算机技术与发展,2009,(08):148.
 XUE Jun,CHEN Hang,TAO Jun.Technology of Intrusion Detection Based on Neural Network[J].,2009,(03):148.

备注/Memo

备注/Memo:
胡吉明(1960-),男,浙江绍兴人,副教授,硕士研究生导师,研究方向为高可用系统和分布式计算
更新日期/Last Update: 1900-01-01