Font Size: a A A

Modeling And Simulation Of TCP-SYN Flood Attack Based On Opnet

Posted on:2015-11-04Degree:MasterType:Thesis
Country:ChinaCandidate:X GongFull Text:PDF
GTID:2298330467462109Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Today, most of the important work and critical services are dependent on the rapid development of technology, if there is no Internet, they will be difficult to operate normally, so any interruption of network operation will bring great inconvenience. Considering the Internet was originally aimed at open and scalable design, and not much security in mind, it is obvious that a malicious user can take advantage of the Internet’s design flaws to undermine most services running. In many types of network attack, DoS attack is a major security threat to Internet services, resulting in a massive loss of income. There is a particular type of DoS attack, which is large-scale cooperation attack and usually initiated by a large number of hosts invaded, it is known as distributed denial of service (DDoS). DDoS attacks bring the growing threat to commerces and Internet services providers around the world. In DDoS attacks, TCP-SYN flood attack is one of the most common attack. TCP-SYN flood attacks affect the host operating TCP server process (three-way handshake to establish a TCP connection), and now, even though it is a relatively primitive means of attack, but still see a lot of attacks by its evolution. Therefore, TCP-SYN Flood attack still has its research value and significance.In this paper, starting from the analysis of DDoS attack system, including the definition of DDoS attack, the attacker’s motives, the implementation process of attack, botnets, direct attacks and reflection attacks and the common DDoS attack tools. After these, classification of DDoS attacks from the perspective of protocol, and precautions are taken on a brief introduction. Then, analyze and study the TCP-SYN Flood attack principle and its common attack types. On this basis, using OPNET network simulation platform for TCP-SYN Flood attack to model and simulate. Finally, the simulation results are analyzed, which shows the danger of TCP-SYN Flood attack and verifies that TCP-SYN Flood attack modeling is accurate.
Keywords/Search Tags:ddos, tcp-syn flood attack, opnet, modeling andsimulation
PDF Full Text Request
Related items