1. Trang chủ
  2. » Luận Văn - Báo Cáo

Nghiên cứu các giải pháp giám sát lưu lượng mạng internet phục vụ công tác an ninh, an toàn thông tin

90 19 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 90
Dung lượng 4,15 MB

Nội dung

Ngày đăng: 18/01/2021, 13:33

Nguồn tham khảo

Tài liệu tham khảo Loại Chi tiết
20. Cisco, Defining Strategies to Protect Against TCP SYN Denial of Service Attacks,http://cio.cisco.com/warp/public/707/4.html Link
1. B. E. Brodsky and B. S. Darkhovsky (1993), Nonparametric Methods in Change- point Problems, Kluwer Academic Publishers, pp. 78-90 Khác
2. Christos Douligeris and Aikaterini Mitrokotsa (2003), DDoS Attacks And Defense Mechanisms: A Classification, Signal Processing and Information Technology Khác
3. Jelena Mirkovic, Janice Martin and Peter Reiher (2004), A Taxonomy of DDoS Attacks andDDoSDefenseMechanisms, ACM SIGCOMM Computer Communication Review Khác
4. Jameel Hashmi, Manish Saxena, and Rajesh Saini (2012), Classification of DDoS AttacksandtheirDefenseTechniquesusingIntrusionPreventionSystem,InternationalJournalofComputerScience&Communication Networks Khác
5. Jelena Mikovic, G.Prier and P.Reiher (2002), Attacking DdoS at the source, Proceedings of ICNP Khác
6. Jelena Mikovic, G.Prier and P.Reiher (2002), A Taxonomy of DdoS Attacks and DdoS Defense Mechanisms , UCLA CSD Technical Report no. 020018 Khác
7. Jelena Mikovic, G.Prier and P.Reiher (2002), Source Router Approach to DdoS Defense – UCLA CSD Technical Report no. 010042 Khác
8. Kanwal Garg, Rshma Chawla (2011), Detection Of DDoS Attacks Using Data Mining, International Journal of Computing and Business Research Khác
9. K.Park and H. Lee.(2001), On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets. In Proceedings of ACM SIGCOMM Khác
10. Mbabazi Ruth Reg. No (2005), Victim-based defense against IP packet flooding denial of service attacks Khác
11. Monowar H. Bhuyan, H. J. Kashyap, D. K. Bhattacharyya and J. K. Kalita (2013), Detecting DistributedDenialofService Attacks: Methods, Tools and Future Directions, The Computer Journal Khác
12. Mohammed Alenezi (2012), Methodologies for detecting DoS/DDoS attacks against network servers,TheSeventhInternational Conference on Systems and Networks Communications - ICSNC Khác
13. Rajkumar, Manisha Jitendra Nene (2013), A Survey on Latest DoS Attacks Classification andDefenseMechanisms,International Journal of Innovative Research in Computer and CommunicationEngineering Khác
14. Saman Taghavi Zargar, James Joshi, Member and David Tippe (2013), A Survey of DefenseMechanismsAgainstDistributed Denial of Service (DDoS) Flooding Attacks, IEEE Communications Surveys & Tutorials Khác
17. Tony Scheid (2011), DDoS Detection and Mitigation Best Practices, Arbor Networks Khác
18. T. Peng, C. Leckie, and K. Ramamohanarao (2003), Detecting distributed denial of service attacks, using source ip address monitoring Khác

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

w