目录
1.概述 ..............................................................................................................................................1
1.1 研究背景和意义 ................................................................................................................1
1.2 DDoS 攻击的研究现状 .....................................................................................................1
1.3 DDoS 攻击的防御对策研究现状 .....................................................................................2
1.3.2 当前 session control 机制研究状况 .......................................................................3
1.4 本文主要工作 ....................................................................................................................4
1.5 论文的组织结构 ................................................................................................................4
2.分布式拒绝服务攻击研究 ..........................................................................................................4
2.1 DDoS 攻击原理 .................................................................................................................4
2.1.1 DDoS 网络 ...............................................................................................................4
2.1.2 DDoS 进攻的一般过程 ...........................................................................................6
2.1.3 DDoS 进攻的一般步骤 ...........................................................................................6
2.2 DDoS 攻击分类 .................................................................................................................7
2.2.1 剧毒包攻击 ..............................................................................................................8
2.2.2 风暴型攻击 .............................................................................................................8
2.3 攻击工具的分析 ..............................................................................................................10
2.4 本课题采用的攻击工具 ..................................................................................................12
3.web 服务器的搭建.....................................................................................................................13
3.1 web 服务器的选择...........................................................................................................13
3.2 web 服务器的开发...........................................................................................................13
3.2.1 理论上的推导 ........................................................................................................13
3.2.2 数值上的分析 .......................................................................................................14
3.2.3 程序开发 ...............................................................................................................16
3.2.4 实验结果 ...............................................................................................................18
3.3 本章总结 .........................................................................................................................19
4.三种攻击环境的搭建 ................................................................................................................19
4.1 攻击的环境 .....................................................................................................................19
4.2 Request Flooding Attack ..................................................................................................20
4.2.1 Request Flooding Attack 攻击的形成原理 ...........................................................20
4.2.2 Request Flooding Attack 攻击的发起 ...................................................................21
4.3 Asymmetric Workload Attack..........................................................................................22
4.4 Repeated One-Shot Attack ...............................................................................................22
4.5 实验结果 .........................................................................................................................22
4.6 本章总结 .........................................................................................................................23
5.结束语 ........................................................................................................................................23
致谢 ...............................................................................................................................................24
评论0
最新资源