Font Size: a A A

Research And Implementation Of Defending Against DDoS Model Based On Honeypot Technology

Posted on:2007-04-12Degree:MasterType:Thesis
Country:ChinaCandidate:B Y WangFull Text:PDF
GTID:2178360185986905Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Distributed Denial of Service (DDoS) attacks against Internet security is one of the attacks that most harm and difficult to prevent. While the research for defending against DDoS attacks be took in a wide range , since DDoS attacks' means uniqueness, the current methods are not fundamentally to defending against such attacks. This paper analysis of the DDoS attack principles and the current methods used to defending against the DDoS, and summed up its shortcomings also; This paper has also analyzed the shortcoming of current model.which based on honeypot technology. For improve these shortcomings , This paper designed and implemented a model based on honeypot technology to defending against DDoS. Honeypot technology is a new technology for network security, Its main role is to confuse hackers and records attacks. This model using honeypot sub-network to receive attacks flow that switching from server, it can protect host server and confuse hackers, also can records hackers information in detail. Log information for analysis and evidence of attack is very important, In order to ensure the security and credible of honyepot systems collected log information, this paper also designed and realized a program to store log information in a long-distance server. This model adopts the way of judging then transmiting the attacks flows to the honeypot, have protected the server and guaranteed the normal access of the important customer at the same time . The model that this paper puts forward has the following advantages :(1) Select the most popular honeypot system— Honeyd as the honeypot of this model, Honeyd can imitate many kinds of operating systems , open source code , strong log fuction etc(2) According to the essential characteristic that network flow unusual sharply to detecting DDoS attack by the ripest invasion detection system —Snort at present,...
Keywords/Search Tags:Network security, DDoS, Honeypot, Access control
PDF Full Text Request
Related items