Font Size: a A A

Distributed Collaborative Research And Implementation Of The Attack System

Posted on:2009-03-19Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhuFull Text:PDF
GTID:2208360245479200Subject:Systems Engineering
Abstract/Summary:PDF Full Text Request
Along with the expanding of using of computers and Internet, network plays an important role in human society and is also faced with huge danger. So Intrusion detecting and defending is important. Only by completely understanding the principle of network attacking methods and knowing the whole attacking process, could we carry out the effective solutions to protect the internet information security.According to the reason mentioned above, Coordinated attacking system ,which containing various of network attacking is carried out in the paper. The system is capable of attempering the computers to attack a long-distance target computer from excessive azimuth and showing biggish significance for the network security. The main work of this paper was:1,The idea of modeling the network attacking task flow by using the theory of Petri net was proposed so that the attacking task can be executed by the logic of the Petri net. The cooperation of attacking crunodes was achieved by appointing the child tasks to different nodes.2,Mesosphere was imported to Coordinated attacking system, and the traditional C/S mode was replaced by the three-layer architecture. The mesosphere was constructed by agent, which was able to parse the order and transfer the tasks, so that the burden of the server would be released and the efficiency of the system would be improved.3,In order to integrate various of network attacking ,the system carried out different traditional attacking modes, and encapsulated them together. Compatible network attacking could be choosed and carried out if necessary.An attacking experiment was carried out both by coordinated system and by a single computer to validate the effect and cooperation of the system, the result of the experiment was analyzed at the same time. It could be concluded that an ideal attacking result was obtained by coordinated attacking system and the intensity of coordinated attacking was far more than single attacking. In the experiment of coordinated attacking, attacking points were attempered uniformly to achieve the attacking tasks at last. From this experiment, the paper drawed a conclusion that the designing and implementation of the coordinated attacking system had an ideal cooperation characteristic.
Keywords/Search Tags:network security, attacking by excessive azimuths, modeling with Petri net theory, Mesosphere, communication agent
PDF Full Text Request
Related items