Font Size: a A A

Design And Implementation Of Network Layer Attacks Platform Based On B/S Architecture

Posted on:2014-10-24Degree:MasterType:Thesis
Country:ChinaCandidate:R YangFull Text:PDF
GTID:2268330401952273Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet applications, network security issues become more and more serious. Although the protective ability of firewall, IDS, confidentiality, authentication and other security technology is growing, but they are mainly passive protection can not cope with the endless stream of new cyber attacks. Implementation of active defense network systems in recent years is accepted mainstream thinking generally. In active defense technology, penetration testing technology is one of the essential tools, which can provide some basic functions, such as detecting the system security vulnerabilities, testing the impact of new attack techniques, producing IDS research attack source and other basic functions, by lauching active attacks. In this paper, we study a network layer attack platform, used to test a variety of attacks and vulnerabilities of the network protocol.In the functional design of the platform, according to the aforementioned three types of basic functions, the platform provides login, sending engine, log and report processing, feedback and output engine and other functional units, support the dynamic expansion of the new attack techniques, as well as attack the ability to customize. At present, the system can perform a denial of service, buffer overflow, FTP, HTTP, PoP3D attack test, and UDP port, TCP port scan. Real-time monitoring and recording statistics on traffic schedule, contract amount, completion status, logging attacks test results, to facilitate future processing and analysis.In the structural design of the software implementation of the platform, with a B/S network structure users can log the attack platform by any network terminal based on browser, the use of two-factor authentication and SSL protocol provide an ability for user to access the remote server securely. The attack tool library is built on the server side, which has the characteristics of flexibility to add any attack testing tools.Test results of the analysis show that the platform has good characteristics such as friend interface, convenient operation, flexibile applications. the normal function of the various functional modules achieves the design goals of the platform.
Keywords/Search Tags:Network Security, B/S architecture, Attacks platform, Hacker tool
PDF Full Text Request
Related items