Font Size: a A A

The Method Research Of The DDoS Attack Detections

Posted on:2016-01-23Degree:MasterType:Thesis
Country:ChinaCandidate:Z G WangFull Text:PDF
GTID:2308330479484122Subject:Detection Technology and Automation
Abstract/Summary:PDF Full Text Request
In recent years,with the rapid development of computer network,communication and other technologies,the society is moving towards the globalized information society. The development of information and computers networks brings people’s lives a lot of convenience. But at the same time computer network security situation is more severe, network security incidents is endless.As one of the most destructive and dangerous way of network attack in 21 st century, DDoS attacks which also named distributed denial of service attack have a greater threat on the network security of personal, business and even within the political sphere based on Its simple attack principle,diverse attack tools, strong destructive attack and other characteristics.How to make the computer accurately detect DDoS attacks under different scenarios,precisely distinguish the attack traffic and normal operation of the network traffic, and then get information about their attacks in the attack detection phase as much as possible,has become a defensive problem of DDoS attacks to be solved urgently.In terms of the present stage,DDoS attack defense way are mostly concentrated in one or several specific types of DDoS attacks,and inability to detect and defense all the DDoS attacks from whole and its problems.Therefore,based on improving the efficiency of detecting DDoS attack and defense,based on the concept and features of DDoS attacks were analyzed,and in combination with common DDoS attack method and testing technology,on the basis of network traffic is presented and the session statistical IP credit DDoS attack detection scheme. Using this scheme,when the DDoS attack detection,by offering may need to test platform of the attacker detecting data,the DDoS defense work instruction,so as to guarantee the network security.
Keywords/Search Tags:DDoS attacks, Traffic statistics, Line of credit
PDF Full Text Request
Related items