当前显示
106-110 of 132
[摘要]
Abstract: As a major approach for a network security system to discover threats or forensics, DPI (Deep Packet Inspection) technique is widely used in monitoring network flo...
[摘要]
Log correlation analysis plays an important role in many information security areas. For example, it can be used to help nd abnormal navigation behaviors in inside threat detection. Besides...
[摘要]
Abstract: SYN Flood attack is still one of major distributed denial of service attacks. Any network device or computer system with connection state table have the possibilit...
[摘要]
非对称路由环境下SYN flood攻击防御方法
摘要:针对现有网络安全设施无法有效防御非对称路由环境下流量规模较大的SYN flood攻击的问题,对SYN flood攻击检测技术和TCP连接管理策略进行研究,提出了一种轻量级攻击检测和混合连接管理策略相结合的防御方法,利用SYN方法分组比例和目...
[摘要]
Abstract: With the growing demand for accelerating large scale web access, web proxy cache is widely used. To make full use of computing resource and bandwidth of proxy cach...