【24h】

Analysis and Protection of SYN Flood Attack

机译:SYN Flood攻击的分析与保护

获取原文

摘要

This paper described the basic principles of SYN flood attacks, and then described in detail the implementation of two more effective and convenient defense method, SYN-cookie technology and state-based monitoring of the source address technology. SYN-cookie technology achieved a stateless handshake, to prevent the resources consumption of SYN flood. Based on monitoring of the source address state technology can connect to each server's IP address to monitor the status of the initiative to take measures to prevent SYN flood attacks. These two technologies are the most mature and proven technology for the defense of all SYN flood attacks.
机译:本文介绍了SYN Flood攻击的基本原理,然后详细介绍了两种更有效,更方便的防御方法,即SYN-cookie技术和基于状态的源地址监控技术的实现。 SYN-cookie技术实现了无状态握手,防止了SYN Flood的资源消耗。基于监视源地址的状态技术可以连接到每台服务器的IP地址,以主动监视状态的状态采取措施,防止SYN泛滥攻击。这两种技术是防御所有SYN Flood攻击的最成熟,最成熟的技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号