Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering》 2004-01
Add to Favorite Get Latest Update

Diffusible Strategy Based on TCP Interception in Trusted-network

JIN Guang1,ZHAO Yiming1,SHEN Minxin1,QIAN Jiaqi2 (1. Information College, Ningbo University, Ningbo 315211;2. Ningbo Public Security Bureau , Ningbo 315040)  
The paper introduces the theory of distributed denial of service, in trusion detection and defense strategy. And it shows a strategy using diffusible TCP interception to withstand SYN-flooding. In a trusted-network, several route rs help the single attacked-router to finish the work of interception. Analysis of characteristic and efficiency of the strategy is given.
【Fund】: 宁波市软件产业发展基金资助项目(R200336);; 宁波大学校内基金资助项目(0 310048)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 2 Hits
1 JIN Guang, ZHAO Jieyu, ZHAO Yiming, WANG Xiaohong (Institute of Information Science and Engineering, Ningbo University, Ningbo 315211);An Anti-DoS Attack Model Based on Ingress Address Marking[J];Computer Engineering;2004-15
2 JIN Guang 1, ZHU Xi xiong 2 (1.Faculty of Information Science and Technology, Ningbo University, Ningbo 315211,China; 2.Faculty of Engineering, Ningbo University, Ningbo 315211, China);A Review on Anti-DoS Attack Techniques on Internet Ⅰ ——Classifications and characteristics · Packet filtering · Attack detection and defending[J];Journal of Ningbo University(Natural Science & Engineering Edition);2004-04
【Citations】
Chinese Journal Full-text Database 2 Hits
1 XUE Dong,ZHAO Guo qing,HU Jian wei(Staff room 204 ,Xidian University ,Xi'an.710071,China);Traceback algorithms to Denial-of-Service Attack Routes[J];;2002-02
2 CHEN BoYU Ling(,)Dept.of Computer Science,Nanjing Normal UniversityNanjing 210097;Approach to Countermeasures of SYN Flooding Attack[J];Computer Engineering;2001-07
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 WU Jian-sheng,ZHAN Xue-gang(School of Computer Science and Engineering,Anshan University of Science and Technology,Anshan 114044,China);Research of intrusion detection system based-on state automaton about TCP protocol[J];Journal of Anshan University of Science and Technology;2005-05
2 Wang ZhiXin (China Youth College for Political Sciences Beijing 100089);The Comparison of Several Common Web Browsers[J];Office Automation;2007-20
3 ZHAO Yong-chi, WU Jian, CHEN Bo(College of Computer, Southwest University of Science & Technology, Mianyang 621002, China);Application of Network Address Translation Technology in Firewall[J];Ordnance Industry Automation;2005-01
4 LUO Shou-shan~1,CHEN Ya-juan~2,SONG Chuan-heng~2,WANG Zi-liang~2,NIU Xin-xin~2,YANG Yi-xian~2(1.Software Engineering School, Beijing University of Posts and Telecommunications, Beijing 100876, China;2.Information Engineering School, Beijing University of Posts and Telecommunications, Beijing 100876, China);An Abnormal Intrusion Detection Model Based on User's Keystrokes[J];Journal of Beijing University of Posts and Telecommunications;2003-04
5 TIAN Da\|xin\+1, LIU Yan\|heng\+1, WEI Da\+1,ZHANG Shu\|wei\+2 (1College of Computer Science and Technology, Jilin University, Changchun 130012,China;2Baichen's Bureau of Traffic of Jilin,Baichen 137300,China);Design and implementation of network-intrusion detecting system[J];Journal of Changchun Post and Telecommunication Institute;2003-04
6 ;Development and Application Status of Genetic Algorithms In Intrusion Detection System[J];Sensor World;2007-04
7 FU Cheng-hong, FU Ming, XIAO Ru-liang, TANG Xian-ying (College of Electr. & Information Eng., Changsha Univ. of Science & Technology,Changsha 410077,China);Faster Method for Intrusion Detection Based on Decision Tree[J];Journal of Changsha University of Electric Power(Natural Science);2004-01
8 SHI Zhi-cai, MAO Yu-cui, LIU Ji-feng (College of Information Engineering, Dalian University, Dalian 116622, China; Computer Science and Technology Institute, Harbin Institute of Technology, Harbin 150001, China);Network information security techniques[J];Journal of Dalian University;2003-04
9 Zhan Jinyu Xiong Guangze Sun Ming (College of Computer Science and Engineering , UEST of China Chendu 610054 );Framework of an Intrusion Detection System Based on DM[J];Journal of University of Electronic Science and Technology of China;2002-05
10 LIU Zhe,WANG Wei-ran (School of Electronic Engineering, UEST of China Chengdu 610054);Study of Distributed Firewall Based Security System[J];Journal of University of Electronic Science and Technology of China;2005-03
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 CHEN Yi-fei (Economics School of Anhui University, Hefei 230001,China);Technique of PACKET TILTE in the Linux firewall[J];Journal of Anhui Institute of Architecture;2005-03
2 KONG Huijun(South China Teacher's University, Education and Science College Psychologist Department, Guangzhou 510631);Two Traditions in Memory Study[J];Journal of Anyang Teachers College;2003-03
3 ZHAO Jun_hui,XU Kun (College of Electronics and Information Engineering, Northern Jiaotong University, Beijing 100044,China);Design and Implement of Web Page Monitor and Restore System[J];Journal of Northern Jiaotong University;2002-01
4 LU Huiqin,ZHANG Hong,LUO Shoushan,YANG Yixian(Information Engineering School, Beijing University of Posts and Telecommunications, Beijing 100876, China);Denial of Service in Non-Buffer Systems[J];Journal of Beijing University of Posts and Telecommunications;2003-03
5 CHEN Chuan,HE Yue,HE Chang-zheng(College of Commercial Management, SCU, Chengdu 610064, China);Economic pre-warning based on self-organization data mining[J];Journal of Chengdu University of Information Technology;2005-01
6 LIU Song qing (Research Institute of the Jingling Petrochemical Corp.,Nanjing 210046,China);Analysis of the network system security[J];Telecommunications For Electric Power System;2002-02
7 XU Wen bo, LEI Tao (College of Information Technology, Southern Yangtze University, Wuxi 214036, China);Study and implementation of security system on Linux-host[J];Information Technology;2003-07
8 LI Xiao-jing,CHEN Xing-yuan,LI Cheng-hui,JIA Li-xin (Institute of electronic Technology, the PLA Information Engineering University, Zhengzhou 450004, China);Analyse and study to DoS attack[J];Henan Science;2005-03
9 Hou Xiaomei Mao Zongyuan Institute of Electronic and Information,South China University of Technology,Guangzhou 510640 Zhang Bo Institute of Electronic Power,South China University of Technology,Guangzhou 510640;Internet Security Technology Based on P2DR Model[J];Computer Engineering and Applications;2000-12
10 Zhu Jianming Shi Tingjun Ma Jianfeng(School of Computer,Xidian University,Xi'an710071)(State Key Laboratory of Information Security,Chinese Academy of Sciences,Beijing100039);Multi-agents Based Intrusion-Tolerant Architecture[J];Computer Engineering and Applications;2003-11
【Secondary References】
Chinese Journal Full-text Database 3 Hits
1 Jin Guang Zhao Jie-yu Zhao Yi-ming Wang Xiao-hong (Faculty of Info. Science and Tech., Ningbo University, Ningbo 315211 ,China);A Study on IP Traceback of DDoS Attack Ingress within an Autonomous System[J];Journal of Electronics and Information Technology;2005-03
2 HUANG Guang-qiu,LI Xuan(Department of Management,Xi'an University of Architecture and Technology,Xi'an 710055,China);An intrusion detection system based on memory principle[J];Journal of Hebei University of Engineering(Natural Science Edition);2008-01
3 LI Yuan,JIN Guang,ZHANG Hui-zhan,CHEN Zheng,QIAN Jiangbo (Faculty of Information Science and Technology,Ningbo University,Ningbo 315211,China);A New Filtering PHF Model to Defend Against DDoS Attacks[J];Journal of Ningbo University(Natural Science & Engineering Edition);2008-04
【Secondary Citations】
Chinese Journal Full-text Database 1 Hits
1 Ruan Yaoping; Yi Jiangbo; Zhao Zhangsheng(State Key Lab of Information Security, Graduate School of USTC, Beijing 100039);The Model and Methodology of Intrusion Detection in Computer System[J];COMPUTER ENGINEERING;1999-09
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved