透過您的圖書館登入
IP:18.218.48.62
  • 學位論文

分散式阻斷服務攻擊防禦系統之設計

Designing A Protection System against DDoS Attacks

指導教授 : 涂世雄

摘要


摘 要  在本篇論文中我們提出一個新的保護系統以防止伺服器面臨分散式阻斷服務攻擊的問題。他可以改善判斷惡意攻擊的精確度,並且有效提升網路品質。    在提出的第一步驟中,我們提出監測系統結合路由導向的系統建構,這機制能有效疏導惡意封包,以保護伺服器。由於分散式阻斷服務攻擊的封包是有規律性的,我們可以依照這些特性擋下大部分的惡意封包。此外,對懷疑的IP位址做圖形化識別測試,以雙重防線讓分散式阻斷服務攻擊損害降到最小。   在第二步驟中,平時我們會建立IP位址名單的資料庫,當攻擊發生時用以辨別合法使用者,讓用戶能正常使用服務避免受到干擾。  在這篇論文中將具有以下貢獻:  (1) 在我們的系統中,能有效判斷惡意封包,改善錯誤率的問題  (2) 透過建立名單的方式,減少重新分析的時間,避免用戶受到  干擾。   我們相信這些機制可以大大降低DDOS攻擊損害,本論文的研究結果將會給予未來研究防禦分散式阻斷服務上的幫助。

並列摘要


Abstract   In this thesis, we propose a new protection system, it can effectively resist the distributed denial-of-service (DDoS) attacks. It can improve the accuracy of judgment of the malicious attacks, and it can make the network quality more effectively.   In the first step, we propose the combination of the detection and routing-redirect to resist DDoS attacks. This method can effectively channelize the malicious packets. Due to the DDoS packets is features, the monitor-side can use as reference to blocked most of the malicious packets. Besides, we will use the double lines of defense to minimize the damage. In the second step, we establish a list of IP address to determine legitimate users in peacetime. When the attack occurred, it can judge normal users to avoid interference with the user of services.       The contributions of work are as follows.   (1) In our system, we can effectively judge malicious packets to lower the error rates.   (2) The establishment of the list method can reduce the time of re-analysis to avoid interference with the users.   We trust these mechanisms can significantly reduce attack volume. The results of our research in thesis shows that it will be much helpful to future research in the category of the DDoS defense.

並列關鍵字

DDoS

參考文獻


[1] L. Garber, “Denial-of-Service Attacks Rip the Internet,” Computer, vol. 33, pp.12-17, Apr. 2000.
[5] CERT Coordination Center, “Code Red II,” Sept. 2001.
[6] CERT Coordination Center, “Nimda worm,” Sept. 2001.
[7] B. Young, “MyDoom a Taste of Viruses to Come, Says Security Analyst,” Reuters, Feb. 2004.
[10] CERT Coordination Center, “CERTR Incident Note IN-99-07 Distributed Denial of Service Tools,” Jan. 1999.

被引用紀錄


蔡沛廷(2014)。台灣牙科醫療執業人員的專業化變遷〔碩士論文,國立清華大學〕。華藝線上圖書館。https://doi.org/10.6843/NTHU.2014.00065
沈信宏(2013)。東亞流動中臺灣文化人的文化身分與位置──以洪炎秋為例〔碩士論文,國立清華大學〕。華藝線上圖書館。https://doi.org/10.6843/NTHU.2013.00407
顏大惟(2016)。基隆顏家祖厝福隆居之基礎研究〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/cycu201600755
張書華(2010)。臺灣轉型期建築師李重耀之研究〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/cycu201000601
賴榮一(2009)。新竹頭前溪竹東高灘地第一、二期人工溼地的植物變遷與水質淨化調查研究〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/cycu200900296

延伸閱讀