Font Size: a A A

The Research And Implement Of Controlled Bonnets Attacks Experimental Platform

Posted on:2010-12-13Degree:MasterType:Thesis
Country:ChinaCandidate:P ManFull Text:PDF
GTID:2178360278466411Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Internet brings freedom and openness to people, however, at the same time; it also brings security risks that can not be ignored. Network and information security has become the problem that China's Internet must face for its healthy development. Security issue is an eternal theme in the development of the Internet. What network security should consider and perfect covers many aspects, which are from, policies and regulations to technical support, from hardware devices to software systems, from data to content, from nation to enterprises and individuals. Only these aspects are valued and improved, network security can be perfected and protected.However, nowadays network security problems are not optimistic. Computer viruses and hacker attacks threaten network security, and the means for the dissemination of harmful information through Internet have increasingly diversified. The botnet network is one of the most popular hacker tools for committing crimes in Internet. Botnet is a group of computers centralized controlled by the hackers. It is often used by hackers to launch a large-scale network attacks, such as distributed denial of service attack (DDoS) and massive spam. Botnet threat has also become an international issue of great concern.Now the majority of Internet users do not have the specialized knowledge of network security. In order to allow these users to have a better understanding of network security and know more about the process of network attacks, so that they can has a further understanding of the harmness of network attacks , we constructed a controlled botnet attack experimental platform. It can be used to provide a wide variety of distributed network attacks demonstration experimental systems that can truly generate different attack flows from many data sources, construct more complicated so as to provide a convenient way to do the testing and evaluation of the attack and prevent system, event analysis and response research, emergency drills and so on. Different from other attack tools, it provides users with a step-by-step implementation function, which is able to decompose process of the attack demonstration. At the end of each step, it will provide users with a visible result so that the implementation is easier for the users to implement and understand.This thesis has studied the botnet and network attacks. Based on the extensive study, this thesis introduces the requirement analysis, outline design and detailed design of "botnet attack controlled experimental platform" This thesis has implemented three instances network attacks, and the corresponding testing are carried out. The results show that the ordinary Internet users can has a good understanding of DDoS attacks, Ftp infiltration attacks, Windows 2000 system hole attack methods and process, etc., through the platform.
Keywords/Search Tags:network security, botnet, network attack, separate steps, experimental platform
PDF Full Text Request
Related items