Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Security》 2009-03
Add to Favorite Get Latest Update

A Method of Extracting DoS Attack Characters Based on SNMP

HE Ying-jie, YAN Hong-shan (Software Testing Center, 91404 army, Qinhuangdao Hebei 066001,China)  
In the paper, a method that can be used to extract DoS attack characters based on SNMP is mainly described. First of all, by the DoS attack experiments, SNMP object values are collected in several usual DoS attack with the SNMP data collecting software developed by ourselves. Then changes are analyzed qualitatively. Finally DoS attack characters based on SNMP are summarized.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 3 Hits
1 LIN Heng, LI Hua-feng ( College of Computer Science, Beijing University of Technology, Beijing 100022, China );On Simple Network Management Protocol (SNMP)[J];Journal of Beijing Polytechnic University;2004-01
2 Hou Binbin Pan Jiang Lu Jukang(College of Computer Science and Engineering,Shanghai University,Shanghai 200072,China);THE RESEARCH AND DESIGN OF AN ACTIVE INTRUSION DETECTION SYSTEM BASED ON SNMP[J];Computer Applications and Software;2006-06
3 HAN Zhong-xiang~(1,2),SHI Hao-shan~1,ZHUANG Xu-chun~2(1.Electronic Information College,Northwestern Polytechnic University,Xi′an,Shaanxi 710072,China;2.The Telecommunication Engineering Institute,Air Force Engineering University,Xi′an,Shaanxi 710077,China);Implementation of IDS Based on MIB II[J];Journal of Air Force Engineering University(Natural Science Edition);2006-04
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 CHEN Song1,ZHAN Xue-gang1,LIU Yan2(1.Network Information Center,University of Science and Technology Liaoning,Anshan 114051,China;2.Anshan No.1 Secondary Vocational and Technical School,Anshan 114014,China);Policy of double routing access to campus WWW server[J];Journal of Anshan University of Science and Technology;2007-05
2 YANG Bin(College of Computer Science and Technology , Huazhong Univeristy of Science & Technology,Wuhan 430074 , China);The Elemental Research on SSL Protocol and SET Protocol[J];Journal of Jiangxi Normal University (Natural Sciences Edition);2003-04
3 TAN Dan,XIAN Ji-qing(Chongqing University of Posts and Telecommunications,Chongqing 400065,P.R.China);Design of windows firewall driver using NDIS hook[J];Journal of Chongqing University of Posts and Telecommunications;2005-05
4 WU Xiao-jia~(1),LI Wei-hong~(2)(1.Guard Bureau of Guangdong Provincial Public Security Office,Guangzhou 510080,China;2.College of Geography Scienceof South China Normal University,Guangzhou 510630,China);Discussion on the Security System of Information System Based on Enterprise WebGIS[J];Geomatics & Spatial Information Technology;2006-03
5 XUE Lan-yan, ZHENG Sheng-lin, PAN Bao-chang (Faculty Information Engineering, Guangdong University of Technology, Guangzhou, Guangdong, 510643);The Application of Data Encryption in the Electronic Commerce Security[J];Journal of Guangdong University of Technology(Social Sciences Edition);2005-S1
6 Zhu Ye Qin Fang Gu Jian;The Analysis of Modern Authentication Mechanisms[J];Computer Study;2008-05
7 Qi Changping Sun Kelei;Study on Computer Virus and Its Preventing Strategy[J];Computer Study;2009-04
8 Quan Anjing Jiang Guoping Zuo Tao (Department of Electronic Engineering, Nanjing University of Posts and Telecommu nications, Nanjing 210003, China);Logistic-map based block encryption ciphers and its applications[J];Journal of Southeast University (Natural Science Edition);2004-S1
9 Chen Guangshan;Research on Security Mechanism of IP Layer[J];Computer Development & Applications;2008-09
10 ZHANG Jun1 ,ZHOU Shu-feng2(1 Fuyang Communication Station, Bengbu Communication Center-Railway, Bengbu Anhui 236021 ;2 School of Mathematics and Science, Liaocheng Univeristy, Liaocheng Shandong 252059);User's Internet Protocol Addressing Base on GPRS[J];Computer Knowledge and Technology;2005-30
China Proceedings of conference Full-text Database 5 Hits
1 Guo Weidong~1 Xie Yongqiang~2 Wang Zhaojun~2 1 Institute of Command Automation,PLAUST,Nanjing 210007; 2 Institute of China Electronic System Engineering,Beijing 100039;Research and Implementation of Removable mass storage device Authentication mechanisms[A];[C];2008
2 Guo Weidong~1 Xie Yongqiang~2 Wang Zhaojun~2 1 Institute of Command Automation,PLAUST,Nanjing 210007; 2 Institute of China Electronic System Engineering,Beijing 100039;Research the Mode of Removable mass storage device Security management in office circumstances[A];[C];2008
3 Zhu Hongjie~(1,2) Li Daxing~1 1 Institute of Network Secutity,Shandong University 250100; 2 School of Computer Science and Technology,Shandong Institute of Light Industry 250353;Application of Digital Signature in E-commerce[A];[C];2008
4 Fei Xiong ZhongXu Zhang Institute of Communication Engineering,PLA Univ.of Sci.& Tech.,Nanjing,210007;A Kind of IP Address Authentication Scheme Based on CPK[A];[C];2008
5 YIN Runyuan YANG Li College of Information Shanghai Ocean University,Shanghai 200090;Design Encrypted Authentication System Model under Mobile Network Environment[A];[C];2008
【Secondary Citations】
Chinese Journal Full-text Database 3 Hits
1 BI Baoxiang1, XIAO Debao2 (1.College of Information Science and Engineering, Wenzhou University, Wenzhou, Zhejiang 325027; 2.Department of Computer Science, Central China Normal University, Wuhan 430079);The design and implementation of the firewall agent (FW-Agent) entity[J];Journal of Central China Normal University(Natural Sciences);2003-02
2 Han Zhongxiang 1 Shi Haoshan 1 Wang Yuanyi 21 (Electronic Information College,NPU,Xi'an710072) 2 (The Telecommunication Engineering Institute,Air Force Engineering University,Xi'an710077);Study on Optimization in Real-time Intrusion Detection System[J];Computer Engineering and Applications;2004-29
3 HAN Zhong-xiang~1,SHI Hao-shan~1,DU Hua-hua~2(1. Electronic Information College, Northwestern Polytechnical University, Xi′an, Shaanxi 710072, China; 2. The Telecommunication Engineering Institute, Air Force Engineering University, Xi′an, Shaanxi 710077, China);The Implementation of a Distributed Intrusion Detection System[J];Journal of Air Force Engineering University(Natural Science Edition);2004-05
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved