中大機構典藏-NCU Institutional Repository-提供博碩士論文、考古題、期刊論文、研究計畫等下載:Item 987654321/89775
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 80990/80990 (100%)
Visitors : 41661018      Online Users : 1694
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/89775


    Title: 驗證SYN 洪水攻擊防禦方式之平台
    Authors: 陳建欣;Chen, Jian-Xin
    Contributors: 資訊工程學系
    Keywords: 分散式阻斷服務攻擊;阻斷服務攻擊;洪水攻擊;DDoS;Distributed Denial of Service;SYN flood
    Date: 2022-07-19
    Issue Date: 2022-10-04 11:59:14 (UTC+8)
    Publisher: 國立中央大學
    Abstract: 近年來隨著科技的發展各式各樣的設備皆可上網對人們的生活帶來許多便利,但相對的也產生了一些資安上的隱憂,如電視、冰箱、監視器等可連網IoT設備可能會被駭客入侵進而被用於惡意的目的上,而其中又以分散式阻斷式服務攻擊(Distributed Denial of Service,DDoS)最為常見也最具攻擊之效果,由於DDoS的目的在於癱瘓某一正常運作之服務使得正常使用者無法存取到該服務,進而造成對方嚴重的損失。
      DDoS的種類又分成許多種,其中又以SYN flood以及UDP flood最常為駭客所使用,本論文主要專注於TCP中的SYN flood,SYN flood之目的在於佔用伺服器之資源使得正常使用者無法與伺服器建立連線進而造成服務癱瘓,而本論文目的在於探討現行已發展出各種抵禦Syn flood之防禦方式,分析其各種防禦方式之成效與其優缺點。
    ;Nowadays, technology brings many conveniences to our life, but it also leads to some issues about information security. For example, some IoT devices like webcam, television or refrigerator can be used by some hacker. DDoS (Distributed Denial of Service) is the most important one, it can make normal user can’t access the service and make the service and client lost a lot.
    There are lots of kinds of DDoS. SYN flood and UDP flood is the most common DDoS used by attackers, and this paper will focus on SYN flood attack. The main purpose of SYN flood is run out most of server’s resources and make normal user can’t use this service. The purpose of this paper is that discuss the SYN flood mitigations which have been released in public and analyze advantages and disadvantages of each method by the result.
    Appears in Collections:[Graduate Institute of Computer Science and Information Engineering] Electronic Thesis & Dissertation

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML49View/Open


    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明