19. حمالت برخی معرفیمراجع مقابله مراحل مقدمه
SYN floodHTTP POSTSlow Read
19از30
Smurf Fraggle Ping flood
Ping of
death
Teardrop
SYN flood UDP flood
HTTP
POST
Slowloris RUDY
Slow Read Telephony DNS Amp. NTP Amp. SSL
Black hole Rushing Grey hole Wormhole Sinkhole
MANET روی حمالت
20. حمالت برخی معرفیمراجع مقابله مراحل مقدمه
SYN floodHTTP POSTSlow Read
20از30
MANET روی حمالت
TCP three-way handshake
SYN Flood Attack
SYN Cookie
SYN Cache
SYN-RECEIVED time out
Filtering
مقابله
28. حمالت برخی معرفیمراجع مقابله مراحل مقدمه
28از30
[1] NSFOCUS ,“ NSFOCUS Mid-Year DDoS Threat Report 2013 ,”2013.[درونخطي].
Available:http://en.nsfocus.com/SecurityReport/2013%20NSFOCUS%20Mid-
Year%20DDoS%20Threat%20Report.pdf
[2] Ethics in Information Technology George Reynolds - 2011
[3] "Internet strikes back: Anonymous' Operation Megaupload explained". RT. January 20,
2012. Archived from the original on May 5, 2013. Retrieved May 5, 2013.
[4] Richards, Johnathan (The Times) (January 25, 2008). "Hackers Declare War on
Scientology: A shadowy Internet group has succeeded in taking down a Scientology Web
site after effectively declaring war on the church and calling for it to be destroyed.". Fox
News Network, LLC. Retrieved January 25, 2008.
[5] T. Peng ,“ Survey of network-based defense mechanisms countering the DoS and DDoS
problems ,” ACM Computing Surveys ,جلد39,شماره1, pp. 3-es, 2007
[6] Prolexic ,“ Prolexic Quarterly Global DDoS Attack Report Q1 2014 ,” www.Prolexic.com,
2014.