МЕТОДИ ЗАХИСТУ МЕРЕЖЕВИХ СЛУЖБ ВІД TCP SYN-FLOOD АТАК
Анотація
Methods defence of network services from TCP SYN – flood attacks
The modern methods of protecting from TCP SYN-flood attacks unadapted to the overloads and cast aside surplus queries. Development of probabilistic model, which will take into account the productivity of servers
Посилання
Шаньгин В. Ф. Информационная безопасность компьютерных систем и сетей: учеб. пособие / В. Ф. Шаньгин. – М.: ФОРУМ, 2013. – 416 с.
Белов Е. Б. Основы информационной безопасности: учеб. пособие / Е. Б. Белов, В. П. Лось, Р. В. Мещеряков, А. А. Шелупанов. – М.: Горячая линия-Телеком, 2006. – 544 с.
http://www.npk.ru/pub/presentations281010/Kaspersky_DDoS_prevention.pdf
Feinstein L., Schnackenberg D., Balupari R., Kindred D. Statistical Approaches to DDoS Attack Detection and Response. // DARPA Information Survivability Conference and Exposition
http://faculty.nps.edu/ncrowe/oldstudents/monteiro_thesis.htm
Джей Бил и др. Snort 2.1. Обнаружение вторжений. 2-е изд. Пер. с англ. - М.: ООО "Бином-Пресс", 2006;
##submission.downloads##
Як цитувати
Номер
Розділ
Ліцензія
Авторське право (c) 2017 М. М. Нестеренко, В. С. Доманчук
Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.
Authors who submit to this conference agree to the following terms:a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.