Font Size: a A A

The Research On Defense Techniques Against DDoS Attack In Telecommunication Backbone Network

Posted on:2012-07-07Degree:MasterType:Thesis
Country:ChinaCandidate:X B LiFull Text:PDF
GTID:2218330371950801Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of Internet, people are of more dependent on network. Accordingly, the importance of network security got more and more attraction. According to the research on a global network service situation, more than 90% of the internet service providers have to deal with the DDoS attack everyday, which means DDos is still one of the most popular approaches adopted by hackers.In recent years, the domestic telecommunication business developed quickly, such as the ChinaNet and other local service providers. The end users, such as small and medium enterprises, Internet bars and VIP customers, such as such big enterprises, financial and Internet service providers also have great requests for the internet. As an internet service provider, besides the bandwidth rent service, it also has the responsibility for management and maintains, especially to the big companies and important customers. The end users now pay more and more attention to the service-level agreement. Telecom providers are responsible to make sure the internet is safe, available and efficient. This is the best way to keep them competitive.DDoS attack tools can be easily downloaded from internet. They are so easy to use that even the people with little experience can attack other users with these tools. DDoS attacks are very common, while the current network defense strategies, such as firewalls, ID do not work well. The research on protection techniques against DDoS attack is really necessary. An effective DDoS defending scheme is important for the telecommunications network security. In this paper, our work is to analyze the structure of the telecommunications backbone network and the routing rules and construct the follow model according to current network structure. We are also responsible to develop a DDos protection system based on the requests and the current advanced techniques. In addition, to complete the DDos defense system and generate the final product, a reasonable way is to interact with the relative companies and know the current research situations.
Keywords/Search Tags:DDOS, Routing protocol, Flow cleaning, The defense
PDF Full Text Request
Related items