Font Size: a A A

Research On DDoS Network Attack Traceback Technology

Posted on:2017-05-18Degree:MasterType:Thesis
Country:ChinaCandidate:J F XiaoFull Text:PDF
GTID:2348330488966010Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
DDoS(Distributed Denial of Service)attack is one of the most common methods of network attacks,which is to consume the network bandwidth and consume the host resource,so that other users can't access the target server,DDoS attack is a new attack means based on the DoS attack,can use a number of attacks to attack the host simultaneously.DDoS attacks most use the mode of false IP source address,and a large number of attack packets,that will take serious repercussions to the victim's network service Therefore,the research on the technology of DDoS network attack source tracing has been the hotspot of network security research.This thesis is based on the Particle Swarm Optimization Algorithm,the research of DDoS network attack traceback technology in the traditional IPv4 network and the new generation of IPv6 network.Firstly,this paper give the brief statement of the background and significance of the research,and summarizes the research status of domestic and foreign.Respectively,were analyzed from the principle of DDoS attack,the attack types and attack characteristics of DDoS attack for the three related aspects concepts.Study the existing DDoS traceback technology,the advantages and disadvantages of various types of technology were compared,for the follow-up depth study traceback technology laid the foundation.Secondly,select the packet marking strategy for the study,and depth study the existing packet marking technology.Compare the probability of packet marking technology and the determine package marking technology,and analyzes the basic principles of Particle Swarm Optimization Algorithm,put forward a new packet marking technology based on Particle Swarm Optimization Algorithm.Finally,on NS2 simulation platform,in IPv4 and IPv6 networks to attack path reconstruction,and analysis the simulation results and the performance of this traceback scheme.
Keywords/Search Tags:Network security, DDoS, Attack source tracing, PSO, Network simulation
PDF Full Text Request
Related items