An application of monitoring distributed denial of service based on Linux platform

碩士 === 國立屏東商業技術學院 === 資訊管理系(所) === 100 === This research has established an application monitoring distributed denial of service (DDoS) attacks. We adopt TFN2K (Tribe Flood, the Net 2K) as an attack traffic generator and observe the system resource of the victim target like CPU utilization, memory u...

Full description

Bibliographic Details
Main Authors: Hsin-Chiao Chen, 陳星橋
Other Authors: Chin-Ling Chen
Format: Others
Language:zh-TW
Published: 2012
Online Access:http://ndltd.ncl.edu.tw/handle/85043880915871748606
id ndltd-TW-100NPC05396009
record_format oai_dc
spelling ndltd-TW-100NPC053960092015-10-13T21:17:24Z http://ndltd.ncl.edu.tw/handle/85043880915871748606 An application of monitoring distributed denial of service based on Linux platform 一個建置在Linux平台上監控分散式阻斷服務攻擊的應用 Hsin-Chiao Chen 陳星橋 碩士 國立屏東商業技術學院 資訊管理系(所) 100 This research has established an application monitoring distributed denial of service (DDoS) attacks. We adopt TFN2K (Tribe Flood, the Net 2K) as an attack traffic generator and observe the system resource of the victim target like CPU utilization, memory usage, consumed by attack traffic. The types of attack traffic have been analyzed and by that we develop a defense scheme. The experiment has demonstrated that the proposed scheme can effectively prevent the attack traffic, by coordinating the firewall. Chin-Ling Chen 陳俊麟 2012 學位論文 ; thesis 53 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立屏東商業技術學院 === 資訊管理系(所) === 100 === This research has established an application monitoring distributed denial of service (DDoS) attacks. We adopt TFN2K (Tribe Flood, the Net 2K) as an attack traffic generator and observe the system resource of the victim target like CPU utilization, memory usage, consumed by attack traffic. The types of attack traffic have been analyzed and by that we develop a defense scheme. The experiment has demonstrated that the proposed scheme can effectively prevent the attack traffic, by coordinating the firewall.
author2 Chin-Ling Chen
author_facet Chin-Ling Chen
Hsin-Chiao Chen
陳星橋
author Hsin-Chiao Chen
陳星橋
spellingShingle Hsin-Chiao Chen
陳星橋
An application of monitoring distributed denial of service based on Linux platform
author_sort Hsin-Chiao Chen
title An application of monitoring distributed denial of service based on Linux platform
title_short An application of monitoring distributed denial of service based on Linux platform
title_full An application of monitoring distributed denial of service based on Linux platform
title_fullStr An application of monitoring distributed denial of service based on Linux platform
title_full_unstemmed An application of monitoring distributed denial of service based on Linux platform
title_sort application of monitoring distributed denial of service based on linux platform
publishDate 2012
url http://ndltd.ncl.edu.tw/handle/85043880915871748606
work_keys_str_mv AT hsinchiaochen anapplicationofmonitoringdistributeddenialofservicebasedonlinuxplatform
AT chénxīngqiáo anapplicationofmonitoringdistributeddenialofservicebasedonlinuxplatform
AT hsinchiaochen yīgèjiànzhìzàilinuxpíngtáishàngjiānkòngfēnsànshìzǔduànfúwùgōngjīdeyīngyòng
AT chénxīngqiáo yīgèjiànzhìzàilinuxpíngtáishàngjiānkòngfēnsànshìzǔduànfúwùgōngjīdeyīngyòng
AT hsinchiaochen applicationofmonitoringdistributeddenialofservicebasedonlinuxplatform
AT chénxīngqiáo applicationofmonitoringdistributeddenialofservicebasedonlinuxplatform
_version_ 1718059479128342528