期刊文献+

DoS渗透测试平台的设计与实现 被引量:2

Design and Implementation of DoS Penetrating Test Platform
在线阅读 下载PDF
导出
摘要 介绍了DoS攻击的原理及常见的DoS攻击,设计了基于Web的DoS渗透测试平台原型,并在Linux下用JSP和C语言原始套接字实现了该原型;使用Java语言编写了全连接端口扫描类,采用先进行端口扫描后测试的方法,提高了测试的效率;对Web方式渗透测试平台和传统测试软件性能进行了比较与分析,在此基础上,提出了有效减小DoS攻击危害程度的方法。 This paper presents the theory of the DoS attacks and the common DoS attack mode. The DoS penetrating test platform based on Web is designed, which is implemented by using JSP and raw socket in Linux. The port scan class is implemented by using Java. The platform scans ports before penetrating test to increase the test efficiency. Finally, Comparing and analyzing their performance, this paper proposes a method that can decrease the DoS attack damage.
出处 《太原理工大学学报》 CAS 北大核心 2007年第4期290-293,共4页 Journal of Taiyuan University of Technology
基金 山西省自然科学基金资助项目(20041047)
关键词 拒绝服务 WEB JSP 渗透测试 DoS Web JSP Penetrating test
  • 相关文献

参考文献4

  • 1陈波.SYN Flood攻击源代码分析[J].计算机工程与应用,2003,39(7):36-39. 被引量:5
  • 2徐永红,张琨,杨云,刘凤玉.Smurf攻击及其对策研究[J].南京理工大学学报,2002,26(5):512-516. 被引量:12
  • 3Basheer Al-Duwairi,G Manimaran.A novel scheme for SYN flooding mitigation[C].INFOCOM,2005:2820-2824.
  • 4Ju Wang,Linyuan Lu.Tolerating Denial of Service Attacks Using Overlay Networks; Impact of Overlay Network Topology[C].Proceedings of the 1st ACM Workshop on Survivable and Self-Regenerative Systems,2003.

二级参考文献11

  • 1怀石工作室编著.Linux上的C编程[M].中国电力出版社,2000..
  • 2[1]Computer emergency response team. Cert advisory-2000. Denial of service developments. http://www.cert.org/advisories/CA-2000-01.html
  • 3[2]Heberlein L T, Bishop M. In: Ellen F.Attack class: address spoofing. Proceedings of the 19th National Information Systems Security Conference. Baltimore:Johns Hopkins University Press,1996. 371~377
  • 4[3]Craig A. The latest in denial of service attacks:"smurfing" description and information to minimize effects. http://www.pentics.net/- denial-of-service/white-papers/smurf.cgi
  • 5[4]Ferguson P, Senie D. Network ingress filtering:defeating denial of service attacks, which employ IP source address spoofing. RFC2267-1998. www.landfield.com/rfcs/rfc2267.html
  • 6[5]Dietrich Long S, Dittrich N. In: Brian B, Robert G. Analyzing distributed denial of service tools: the Shaft case. Proceedings of 14th Systems Administration Conference. Berkeley: USENIX Assoc, 2000. 329~339
  • 7[6]Senie D. Changing the default for directed broadcasts in routers. RFC2644-1999. http://www.ietf.org/rfc
  • 8[7]Park K,Lee H. In: Madacan N K, Deutsch S, Merkle C L. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets.ACMSIGCOMM 2001 Conference. USA: ACM, 2001. 15~26
  • 9WarrenWGay著.实战Linux Socket编程[M].西安电子科技大学出版社,2002..
  • 10陈波,于泠.DoS攻击原理与对策的进一步研究[J].计算机工程与应用,2001,37(10):30-33. 被引量:18

共引文献15

同被引文献11

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部