找回密码
 立即注册
家庭/个人应用 2022-09-09 78 0star收藏 版权: . 保留作者信息 . 禁止商业使用 . 禁止修改作品
IP反向追寻技术综述随着Internet在商业流动中的主要性不断增长,网络攻击特别是拒绝服务(DoS)攻击也在不断添加。IP追寻技术能够使受害主机的网络管理员识别建议DoS攻击的很多数据包的真实源头,关于赶快恢复正常的网络功能、阻止再次生成攻击以及终究让攻击者为此担任非常主要。只是识别生成攻击业务的计算机和网络似乎是一个有限目标,可是它所提供的主要头绪有助于识别实践的攻击者。这篇文章用于DoS,比照分析了现有各个IP反向追寻技术的基本原理、优故障和局限性。

(Overview of IP Reverse Tracing Techniques As the Internet's predominance in business flows continues to grow, so does network attacks, especially Denial of Service (DoS) attacks. IP hunting techniques enable network administrators of victim hosts to identify the true source of many of the packets that suggest DoS attacks, making it very important to quickly restore normal network functionality, prevent recurring attacks, and ultimately allow attackers to do so. Merely identifying the computers and networks that generate attack traffic may seem like a limited goal, but it provides key clues that help identify actual attackers. This article is used for DoS, and compares and analyzes the basic principles, advantages, failures and limitations of existing IP reverse tracking technologies.)

[下载]11300667863.rar




上一篇:aspf白皮书
下一篇:pdp 邮件的加密