完整後設資料紀錄
DC 欄位語言
dc.contributor.authorYang, Su-Chiu
dc.contributor.authorTseng, Li-Ming
dc.date.accessioned2009-06-02T08:39:32Z
dc.date.accessioned2020-07-05T06:34:14Z-
dc.date.available2009-06-02T08:39:32Z
dc.date.available2020-07-05T06:34:14Z-
dc.date.issued2006-05-29T07:59:37Z
dc.date.submitted2003-12-18
dc.identifier.urihttp://dspace.fcu.edu.tw/handle/2376/1949-
dc.description.abstractThe notable rise in significant UDP/ICMP flooding events and network worms has increased the need to design effective methods for detecting significant attack traffic and preventing further traffic degradation. This work developed web pages allowing users to monitor abnormal UDP/ICMP flooding attack traffic based on the Netflow transportation traffic logs gathered from the aggregate router. This system has been deployed in one regional network center over a TANet backbone. And the automatic X-Attack traffic detecting and limitation system also was implemented based on known extraordinary attack behaviors.
dc.description.sponsorship逢甲大學,台中市
dc.format.extent8P.
dc.format.extent501418 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries中華民國92年全國計算機會議
dc.subjectX-Attack traffic measurement
dc.subjectICMP/UDP Flooding
dc.subjectblocking attack traffic
dc.subject.other網際網路服務
dc.titleMonitoring X-Attack Traffic over Aggregate Network
dc.title.alternative區域網路超量攻擊訊務的監測
分類:2003年 NCS 全國計算機會議

文件中的檔案:
檔案 描述 大小格式 
WS_010200372.pdf489.67 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。