Font Size: a A A

Ddos Attack Analysis And Defense

Posted on:2005-05-30Degree:MasterType:Thesis
Country:ChinaCandidate:W K ZhangFull Text:PDF
GTID:2208360125464031Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the endlessly development of Internet in information times,Internet leads to hugely affect and impulse to people 's living and working。Because of the application and popularization of the Electronic Business Affairs and Electronic Government Affairs,The security of Internet is becoming more and more important。Many country and company attach more importance to the security of Internet。The DDoS(Distributed Denial of Service attack ) is a more effect and simple tool in all of the attack tools。DDoS is a relatively simple, yet very powerful technique to attack Internet resources。With little or no advance warning, a DDoS attack can abruptly drain the computing and communication resources of its victim within a short time, until the attack is resolved。 Even some of the largest computer makers and web-based service providers are not immune from this problem . DDoS exploits the inherent weakness of the Internet system architecture,its open resource access model, which, ironically, also happens to be its greatest advantage. Unless special care is taken, a DDoS victim can suffer from damages ranging from system shutdown,file corruption, and total or partial loss of services. Even if the victim can cope with the surged demands。 the unwanted, disrupting packet flows often lead to serious performance and revenue losses.This paper systemly presents the theory of DDoS and current ways to deal with it,at last brings forward a kind of way to deal with it 。 This paper composed of six parts。The first part gives introduction of the status and harms of the current security of Internet。The second part gives introduction of the theory of DDoS and DoS and correlation technic groundwork and some ways to defense DDoS。The third part gives introduction of the system collectivity design to defense DDoS 。The fourth part gives introduction of the design of kernel module and realization of firewall in defencing DDoS 。 The fifth part givesintroduction of function test and capability analysis。The sixth part gives introduction of the summarization and prospect。...
Keywords/Search Tags:DoS, DdoS, TCP/IP, Firewall
PDF Full Text Request
Related items