Font Size: a A A

DDOS Attack Prevention System Desgin And Research

Posted on:2012-05-14Degree:MasterType:Thesis
Country:ChinaCandidate:H XuFull Text:PDF
GTID:2178330338492022Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
DDOS attack (Distributed Denial of Service Attack) is a ill on the Internet, which is easy to launch, difficult to prevent and extremely harmful. DDOS attacks in addition to the traditional form based on network layer and transport layer, in recent years has emerged a new type of application layer DDOS attacks. This work study how to design and implement a high-performance defense system, hich can frustrate these two types of DDOS attacks.For traditional DDOS attacks, there have had a lot of sophisticated defense systems. However, with computer hardware and network bandwidth expansion, zombie machines used in DDOS attack are more powerful, and the flood of malicious data that show up at target network of DDOS attack will become greater. This makes the performance of existing legacy DDOS defense systems face with a new challenge. The first part of our work is parallel the existing traditional DDOS algorithm and implement a high-performce defense system based on general multi-core architecture.Compare to traditional DDOS attack, the new application-layer DDOS attack is more difficult to prevent and more harmful. The other part of our work is to propose an effective application-layer DDOS attack defense algorithm and make its implemention has superior performance. Since the two work above based on the same high-performance packet processing platform which based on multi-core architecture, enabling them to work together, constitute a complete DDOS defense system.Multi-core era has come, and how parallel the existing network applications on multi-core architecture allows them to achieve higher operational performance to meet thesurge in network traffic, is a valuable subject. Based on the common core architecture implements a high-performance DDOS defense system on the basis of this work we hope tosummarize a set of possible options on the above topics.
Keywords/Search Tags:Distributed Denial of Service Attack, application layerDDOS, multi-core, lock-free, parallel
PDF Full Text Request
Related items