An application of monitoring distributed denial of service based on Linux platform
碩士 === 國立屏東商業技術學院 === 資訊管理系(所) === 100 === This research has established an application monitoring distributed denial of service (DDoS) attacks. We adopt TFN2K (Tribe Flood, the Net 2K) as an attack traffic generator and observe the system resource of the victim target like CPU utilization, memory u...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2012
|
Online Access: | http://ndltd.ncl.edu.tw/handle/85043880915871748606 |
id |
ndltd-TW-100NPC05396009 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-100NPC053960092015-10-13T21:17:24Z http://ndltd.ncl.edu.tw/handle/85043880915871748606 An application of monitoring distributed denial of service based on Linux platform 一個建置在Linux平台上監控分散式阻斷服務攻擊的應用 Hsin-Chiao Chen 陳星橋 碩士 國立屏東商業技術學院 資訊管理系(所) 100 This research has established an application monitoring distributed denial of service (DDoS) attacks. We adopt TFN2K (Tribe Flood, the Net 2K) as an attack traffic generator and observe the system resource of the victim target like CPU utilization, memory usage, consumed by attack traffic. The types of attack traffic have been analyzed and by that we develop a defense scheme. The experiment has demonstrated that the proposed scheme can effectively prevent the attack traffic, by coordinating the firewall. Chin-Ling Chen 陳俊麟 2012 學位論文 ; thesis 53 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立屏東商業技術學院 === 資訊管理系(所) === 100 === This research has established an application monitoring distributed denial of service (DDoS) attacks. We adopt TFN2K (Tribe Flood, the Net 2K) as an attack traffic generator and observe the system resource of the victim target like CPU utilization, memory usage, consumed by attack traffic. The types of attack traffic have been analyzed and by that we develop a defense scheme. The experiment has demonstrated that the proposed scheme can effectively prevent the attack traffic, by coordinating the firewall.
|
author2 |
Chin-Ling Chen |
author_facet |
Chin-Ling Chen Hsin-Chiao Chen 陳星橋 |
author |
Hsin-Chiao Chen 陳星橋 |
spellingShingle |
Hsin-Chiao Chen 陳星橋 An application of monitoring distributed denial of service based on Linux platform |
author_sort |
Hsin-Chiao Chen |
title |
An application of monitoring distributed denial of service based on Linux platform |
title_short |
An application of monitoring distributed denial of service based on Linux platform |
title_full |
An application of monitoring distributed denial of service based on Linux platform |
title_fullStr |
An application of monitoring distributed denial of service based on Linux platform |
title_full_unstemmed |
An application of monitoring distributed denial of service based on Linux platform |
title_sort |
application of monitoring distributed denial of service based on linux platform |
publishDate |
2012 |
url |
http://ndltd.ncl.edu.tw/handle/85043880915871748606 |
work_keys_str_mv |
AT hsinchiaochen anapplicationofmonitoringdistributeddenialofservicebasedonlinuxplatform AT chénxīngqiáo anapplicationofmonitoringdistributeddenialofservicebasedonlinuxplatform AT hsinchiaochen yīgèjiànzhìzàilinuxpíngtáishàngjiānkòngfēnsànshìzǔduànfúwùgōngjīdeyīngyòng AT chénxīngqiáo yīgèjiànzhìzàilinuxpíngtáishàngjiānkòngfēnsànshìzǔduànfúwùgōngjīdeyīngyòng AT hsinchiaochen applicationofmonitoringdistributeddenialofservicebasedonlinuxplatform AT chénxīngqiáo applicationofmonitoringdistributeddenialofservicebasedonlinuxplatform |
_version_ |
1718059479128342528 |