Font Size: a A A

Analysis On DDoS Attacks Detecting Technology Based On Eigenvector

Posted on:2012-06-13Degree:MasterType:Thesis
Country:ChinaCandidate:X ZhaoFull Text:PDF
GTID:2218330368992539Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In recent years, Internet is developing widely in the world. It plays a more and more important role in political, economic, cultural, military and social life. Internet impacts every aspect of society. Meabwhile, the security of Internet seems more important today. Virus and worm damage the Internet, society suffer a lot from them. DDoS attacks are up to be stealthy and scalable. The distributed reflector denial of service occurs frequently which makes DDoS attacks trend to be more scalable and more serious. The large-scale DDoS attacks are one of the most popular security problems. Distribute denial of service (DDoS) attack becomes the most powerful destroyer. So study and research DDoS attack is meaningful.First, we begin our thesis with the definition and attack methods of Dos. Then induce the emergence of distributed Dos, named DDoS. We shall analyze the DDoS attack's architecture and working principles in detail, and have a thorough and comprehensive study, comparison and summary for its attack medthod. Next, we shall focus on the detection approaches of DDoS attack. In general, there are two categories of DDoS detection methods: characteristics-based detection and abnormity-based detection, and the former one is key point of our research in this thesis. By the summary of current DDoS attack detection medthods and the detection models of some attack tools, and based on the study and analysis of some representative research work in the field of DDoS Detection, abnormal characteristics caused by DDoS attacks are analyzed and a DDoS attacks detecting algorithm based on eigenvector is proposed. Simulation results validate the quickness and effectiveness of the algorithm.Finally, to this topic, we design a whole structure of defending Dos/DDoS system, making it suitable for the detection and defense requirements in practical environment. We shall describe the system's architecture design and work flow detailedly, and analyze its core event processing module design and relevant reaction technology.
Keywords/Search Tags:network security, distributed denial of service, abnormal characteristics
PDF Full Text Request
Related items