Font Size: a A A

Botnet Defense Research

Posted on:2008-01-21Degree:MasterType:Thesis
Country:ChinaCandidate:J L LiFull Text:PDF
GTID:2208360212998907Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Since 2004 a new type of network attacking platform has attracted great attention, it is the BotNet. A BotNet controls a large number of computers, which scatter in different computer networks. It could lead to denial of service attacks, spam and other kinds of harms for the personal data of network users, financial account numbers and passwords. It is a big threat to computer network's security, confidentiality and integrity.In this paper we will first review in depth the development of BotNet, its history and typical instances of BOT. Then we will compare and analysis the structural elements of BotNet with that of distributed denial-of-service attacks (DDoS). Then we will study the BotNet as a platform for launching distributed denial-of-service attacks, as well as the associated attacking technologies and tools, attacking mechanism and the defending methods. By analyzing the self-similarity of the network traffic, we are able to judge whether there is abnormal changes, and for that purpose we will put forward a defense model of DDoS attacks based on trusted historical data. Finally, we will conduct some simulation tests on NS2 for the above BotNet and DDOS model, and discuss the results.
Keywords/Search Tags:BotNet, DDoS, self-similarity, trusted historical data
PDF Full Text Request
Related items