Font Size: a A A

Isochronous Packet Transport Layer Distributed Denial Of Service Attack Mitigation Methods

Posted on:2013-11-09Degree:MasterType:Thesis
Country:ChinaCandidate:L M ZhouFull Text:PDF
GTID:2248330374454329Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The21st century is the period of the information, the scale of the network has beenincreasing with the development of the computer science and communicationtechnology, and the network has access the work、life、entertainment and studying of thepeople. Yet, the science is a double-edged sword forever, there are always many peoplewho use some network technology destroying and interrupting the network. Because ofthe cost of using network is lower and the common users are not care about the securityof the computers, so, the computer of theirs are likely to be invaded by the attackers andbe infected by the Trojan Horse so that the common users act as a part of the DDoSwithout consciousness, attacking the server and the bandwidth of the network far away.This thesis mainly studies about the way of relieving SYN flooding and protectingthe computer against the SYN flooding. Firstly, we introduce the definition and theclassification of the DDoS to the readers, secondly we take some attack events forexample in order to show the harm of the DDoS and we research TCP/IP source code inthe Linux OS in order to know the process of the communication of the TCP, themanagement of the syn_table in the Linux OS and the theorem of the SYN floodingdeeply.Then we tell the shortcoming of the NS2about the TCP in NS2and we propose away of relieving and defending of the SYN flooding, improving the NS2in order tomake others researchers can use the NS2to simulate the SYN flooding easily.At last we design an experiment by using the improved NS2, and we analyze theresult of the experiment to show the method that we proposed is more effective.
Keywords/Search Tags:Network Security, DDoS, TCP, SYN flooding, Connection
PDF Full Text Request
Related items