Font Size: a A A

Ddos Attacks And Defense Methods

Posted on:2006-11-23Degree:MasterType:Thesis
Country:ChinaCandidate:X J ZhengFull Text:PDF
GTID:2208360152998426Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Distributed Deny Of Service (DDoS) attack has become one of the greatest trouble in Network Security. The security of Internet is becoming more and more important. Many countries and companies attach much more importance to the security of Internet. The DDoS is a more effective and simple tool in all of the attack tools. Nowadays there seems to be no substantial improvement in anti-DDoS research on attack preventing, detecting & retorting yet, nor did any effective or nicety method appear to predict the DDoS attack in time. DDoS attack analysis and defending has become one of the frontiers in the field of network security. The paper systmatically presents the theory of DoS and DDoS , severval different ways to deal with DDoS attack . Several tools of DDoS are researched and several ways of defending the DDoS attack are suggested, whats more, the methods of trace source are studied together with some advantages and limitations. A conclusion has reached that detecting & defending against DDoS from source is a valid way to deal with it. The final work is to design and make a firewall based on Stateful Packet inspection. The paper is divided into five parts. The first part is the introduction. The second part is the related technology, the theory of DoS and DDoS etc. The third part is the design of the system of defending against of DDoS. The tecnology of damming Packet is expounded and the thinking of general tecnology and the work flow is discussed. The fourth part is the test. The last part is the introduction of the summarization and prospect.
Keywords/Search Tags:DoS, DDoS, TCP/IP, Firewall
PDF Full Text Request
Related items