http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
정종민(Jeong Jong Min),이지율(Lee Ji Yul),이구연(Lee Goo Yeon) 강원대학교 산업기술연구소 2002 産業技術硏究 Vol.22 No.1
It is very important to detect and remove original sources of DOS (Denial of Service) attacks or connection oriented/connectionless attacks. In this paper, we implement a traceback system that does not require the reaction of routers and administrators and does not need log data. We bring in a traceback server and traceback agents in each network and use sniffing and spoofing schemes. Finally. the traceback server detects attacking hosts using information transmitted from traceback agents.
정종민,이지율,이구연 江原大學校 産業技術硏究所 2002 産業技術硏究 Vol.22 No.B
It is very important to detect and remove original sources of DOS (Denial of Service) attacks or connection oriented/connectionless attacks. In this paper, we implement a traceback system that does not require the reaction of routers and administrators and does not need log data. We bring in a traceback server and traceback agents in each network and use sniffing and spoofing schemes. Finally, the traceback server detects attacking hosts using information transmitted from traceback agents.