现代计算机:下半月版
現代計算機:下半月版
현대계산궤:하반월판
Modem Computer
2012年
22期
51-53
,共3页
SYN%Flood攻击%TCP三次握手%TCP握手缺陷%IP欺骗%攻击检测
SYN%Flood攻擊%TCP三次握手%TCP握手缺陷%IP欺騙%攻擊檢測
SYN%Flood공격%TCP삼차악수%TCP악수결함%IP기편%공격검측
SYN Flood Attack%TCP Three-Way Handshake%TCP Handshake Defects%IP Spoofing%Attack Detection
通过描述TCP三次握手、TCP握手缺陷和IP欺骗,阐述SYNFlood攻击的基本原理。对比传统的SYNFlood攻击检测办法.提出牛顿均差插值检测法。介绍三种防御办法:修改系统配置和采用DDoS防火墙以及在边界路由设备上只允许合法源IP地址才能进入网络。
通過描述TCP三次握手、TCP握手缺陷和IP欺騙,闡述SYNFlood攻擊的基本原理。對比傳統的SYNFlood攻擊檢測辦法.提齣牛頓均差插值檢測法。介紹三種防禦辦法:脩改繫統配置和採用DDoS防火牆以及在邊界路由設備上隻允許閤法源IP地阯纔能進入網絡。
통과묘술TCP삼차악수、TCP악수결함화IP기편,천술SYNFlood공격적기본원리。대비전통적SYNFlood공격검측판법.제출우돈균차삽치검측법。개소삼충방어판법:수개계통배치화채용DDoS방화장이급재변계로유설비상지윤허합법원IP지지재능진입망락。
By describing TCP three-way handshake, TCP handshake defects and IP spoofing, it elaborates the basic principle of SYN Flood attack. Comparing with the traditional SYN Flood attack de- tection method, presents Newton mean difference interpolation assay. And introduces three de- fensive approaches: modifies the server's configuration, utilizes the DDoS firewall and only allow data packets with legitimate source IP address into network on the boundary routing device.