Font Size: a A A

Based On The Source Side Detection Of Ddos Attacks And Defense Technology Research

Posted on:2007-05-19Degree:MasterType:Thesis
Country:ChinaCandidate:J ZhongFull Text:PDF
GTID:2208360185477176Subject:Computational Mathematics
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet, the scale of network expand very quickly. Our learn, work and life have been closely connected by Internet, relating to education, economy, polity, military and so on. It has been an important part of the infrastructure of the society. But with the boom of Internet, Security event happened frequently and different kinds of meas of attacks emerged in endlessly, among which DoS(Denial of Service)attacks become one of the common network attack techniques by the characteristics, such as extensive area, strong concealment, simpleness and efficiency, hard to defense and great destroy, etc. DoS attacks greatly affected the effective service of network and host systems, especially among which, DDoS(Distributed Denial of Service)attacks are greatly threatening Internet, since their greater destroy.This paper analyzes the principle and means of DoS and DDoS attacks synthetically, and the characteristic of some kinds of tools of DDoS attacks are discussed. The current situation of the research of the technology of detection, defense and traceback of DDoS attacks is discussed detailedly. The disadvantage and advantage of these techniques is also discussed respectively.Then the techniques of detection and defense of DDoS based on source-end host and subnetwork are presented . The detection and defense of DDoS based on source-end host and subnetwork are holding up flow by accounting flow and checking up source IP address to decrease and remove the impact of DDoS attacks, based on which the mechanism of detection and defense of DDoS based on source-end host and subnetwork are discussed detailedly. Two parts of system based on source-end host and source-end subnetwork are designed and achieved. Finally the experiment is simulated and the capability is analyzed and compared, from which the system can be proved feasible and stabile by data.
Keywords/Search Tags:DoS, DDoS, Source-end, Detection, Defense
PDF Full Text Request
Related items