English  |  正體中文  |  简体中文  |  Items with full text/Total items : 75533/75533 (100%)
Visitors : 27409221      Online Users : 358
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/9121

    Title: 以重疊網路防禦分散式阻斷服務攻擊;An Overlay Defense System against DDoS
    Authors: 陳俊傑;Chun-Chieh Chen
    Contributors: 資訊工程研究所
    Keywords: 監測系統;分散式阻斷服務攻擊;重疊網路;overlay network;detection system;DDoS
    Date: 2005-07-06
    Issue Date: 2009-09-22 11:41:31 (UTC+8)
    Publisher: 國立中央大學圖書館
    Abstract: 近年來的許多網路攻擊突顯出網路上許多的弱點,更加顯示了網路安全的重 要性。其中造成損害最大的可說是分散式阻斷服務攻擊 (Distributed Denial of Service, 簡稱DDoS)。 由於DDoS 攻擊是大量且分散的,沒有任何防護措施的伺服器,在受到DDoS 攻擊時,可能在數分鐘內就會被癱瘓,所以抵禦DDoS 攻擊的防禦措施很重要。 我們提出利用監測系統和重疊網路的技術來及時啟動防禦系統,隱藏服務主機的 位置,阻擋分散式阻絕服務攻擊,並提供正常的服務給合法使用者。重疊網路 (Overlay Network)係指利用Proxy 等技術,將某應用伺服器多點散布在廣大的 網路中,以達到增進網路安全之目的。在攻擊發生時,可以立刻有效的針對分散 的攻擊加以阻擋來保護伺服器。 我們藉由建立實體的測試網路來實驗我們所提系統的可行性。實驗結果證明 本系統可以有效的阻擋攻擊。 Many attacks on the internet reveal much vulnerability in recent years that more emphasizes the importance of the security of Internet. Among them, DDoS causes the largest damage. Due to DDoS attack is huge and distributed, so that the servers with no protection may be to become paralyzed under attacks in several minutes. So the defense mechanism against DDoS is very important. We proposal is that using detection system and overlay network to start defense system in time, to hide the location of servers, to resist DDoS attacks and to provide services to legitimate users. What Overlay Network means is that using proxy to distribute some service server over the internet, so that to achieve the purpose of enhancing internet security. When attacks happens, it can effectively resist distributed attacks to protect servers. We use the physical topology to experiment the practice of our system. The result of our experiment evidenced that our system cat effectively resist attacks.
    Appears in Collections:[資訊工程研究所] 博碩士論文

    Files in This Item:

    File SizeFormat

    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明