ddos攻击web服务环境的虚拟

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

IDDoS攻击Web服务环境的虚拟摘要分布式拒绝服务(DDoS)攻击是当今网络安全领域最难解决的问题之一。其中重要的原因在于网络上大量不安全的机器的存在,其次是DDoS攻击工具的广泛可获得性以及攻击者通常采用假冒的源IP地址。对于大型的网络来说,拒绝服务攻击很可能会给企业造成巨大的麻烦,甚至造成企业网络的瘫痪。攻击发生时,攻击者短时间内向服务器申请大量的连接,造成服务器无法完成如此多的客户端连接请求,从而无法提供服务。因此,研究DDoS攻击及其对策是非常重要的。本文分析了DDoS攻击的攻击机制,攻击方法,常用DDoS攻击类型等,并在web服务器上加入允许进入控制模块,成功配置了有效的DDoS攻击环境。对常用的三种DDoS攻击方式进行了虚拟和研究,分析了它们各自的优缺点。针对当前网络安全的不足和攻击类型的多样化,本文提出了一个攻击效果理想的DDoS攻击web服务环境的虚拟。这样,可以利用最少的资源获得最大程度的攻击强度。关键词:分布式拒绝服务攻击;web服务;允许进入控制;会话控制机制IIDDoSAttackWebServer’sEnvironmentVirtualAbstractDDoSattackisoneofthemostdifficultproblemsinnetworksecurityfield.Themostimportantreasonisthebeingofmanyunsafemachinesinnetwork.DDoSattacktoolsabroadachievedandattackusuallyadoptcronkIPaddress.Forlargenetwork,DDoSattacksarelikelytogivecompaniesahugetrouble,andevencausedtheparalysisofthecorporatenetwork.Whenattack,theattackertotheserverforashortperiodoftimealargenumberofconnections,causingtheservercouldnotbecompletedsomanyclientrequests,thusunabletoprovideservices.So,researchtheDDoSattackandcountermeasureisveryimportant.ThisarticleanalysesDDoSattack’smechanism,methodandthetypethatincommonuse.Also,weaddtheadmissioncontrolleronthewebserverandsuccessfullyconfiguresthemosteffectDDoSattackenvironmentandcanbaseonattackeffectadjustattackstream.ThisarticlehasbeendummiedandresearchedthethreemodesoftheDDoSattack,andanalyseseachothermeritandflaw.Aimatnowadaysnetworksafety’slackandattacktype’sdiversification,thisarticlebringsforwardaveryperfectattackeffectoftheDDoSattackenvironment.So,itcanusetheleastresourcegainthewholehogattackintension.Keywords:DistributedDenyofService;webserver;admissioncontroller;seesioncontrolIII目录1.概述..............................................................................................................................................11.1研究背景和意义................................................................................................................11.2DDoS攻击的研究现状.....................................................................................................11.3DDoS攻击的防御对策研究现状.....................................................................................21.3.2当前sessioncontrol机制研究状况.......................................................................31.4本文主要工作....................................................................................................................41.5论文的组织结构................................................................................................................42.分布式拒绝服务攻击研究..........................................................................................................52.1DDoS攻击原理.................................................................................................................52.1.1DDoS网络...............................................................................................................52.1.2DDoS进攻的一般过程...........................................................................................62.1.3DDoS进攻的一般步骤...........................................................................................72.2DDoS攻击分类.................................................................................................................72.2.1剧毒包攻击..............................................................................................................82.2.2风暴型攻击.............................................................................................................92.3攻击工具的分析..............................................................................................................102.4本课题采用的攻击工具..................................................................................................123.web服务器的搭建....................................................................................................................143.1web服务器的选择..........................................................................................................143.2web服务器的开发..........................................................................................................143.2.1理论上的推导........................................................................................................143.2.2数值上的分析.......................................................................................................153.2.3程序开发...............................................................................................................173.2.4实验结果...............................................................................................................193.3本章总结.........................................................................................................................194.三种攻击环境的搭建................................................................................................................204.1攻击的环境.....................................................................................................................204.2RequestFloodingAttack..................................................................................................214.2.1

1 / 29
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功