Font Size: a A A

The Research Of Implementation On DDOS Attacking Simulation And Defence In The Military Network

Posted on:2010-04-29Degree:MasterType:Thesis
Country:ChinaCandidate:N CuiFull Text:PDF
GTID:2218330368999840Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the fast developing of military information, the securities of military network are concerned more and more. Because the military information is serving for fight, most of detecting information and fighting orders are transforming in the military network. Therefore, it is forbidden to interrupt the communication in the military during the war. Therefore, in order to protect the life of arms in the battle and secure the victory of war, It is very necessary to research Anti-DDOS in military network.Distributed Deny of Service (DDOS) attack has become not only one of the greatest trouble in network security, but also a greatest hidden trouble in the securities of military network.The thesis systmatically presents the theory of DOS and DDOS, severval different ways to deal with DDOS attack. Several tools of DDOS are researched and several ways of defending the DDOS attack are suggested, whats more, the methods of trace source are studied together with some advantages and limitations. A conclusion has reached that detecting & defending against DDOS from source is a valid way to deal with it. The final work is to design and make a firewall based on Stateful Packet inspection.The thesis is divided into six parts.The first chapter is the introduction of the background of this task and importance of Anti-DDOS in military network.The secnond chapter analyzes deeply the law of DOS attacking. The implements method of DOS attacking is researtched in the simulated military network environment which gives the supporting for the following testing and analysis research on anti-DDOS in military network.The third chapter researchs the theory and main methods of trace source with analysis some advantages and limitations.The fourth chapter researchs the design method of system to defend against the DDOS. The tecnology of damming packet is expounded. The general tecnology route and the work flow is discussed. The realization method of system firewall is presented.The fifth chapter presents the test method of functions and performances of the ststem firewall.The last chapter gives the summarization of the thesis research results and discusses the further research work.
Keywords/Search Tags:DOS/DDOS, Network safety, Firewall, Attacking, Defence
PDF Full Text Request
Related items