跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.82) 您好!臺灣時間:2026/02/20 08:32
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:陳俊傑
研究生(外文):Chun-Chieh Chen
論文名稱:以重疊網路防禦分散式阻斷服務攻擊
論文名稱(外文):An Overlay Defense System against DDoS
指導教授:曾黎明曾黎明引用關係
學位類別:碩士
校院名稱:國立中央大學
系所名稱:資訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2005
畢業學年度:93
語文別:中文
論文頁數:45
中文關鍵詞:分散式阻斷服務攻擊監測系統重疊網路
外文關鍵詞:DDoSdetection systemoverlay network
相關次數:
  • 被引用被引用:5
  • 點閱點閱:279
  • 評分評分:
  • 下載下載:48
  • 收藏至我的研究室書目清單書目收藏:0
近年來的許多網路攻擊突顯出網路上許多的弱點,更加顯示了網路安全的重
要性。其中造成損害最大的可說是分散式阻斷服務攻擊 (Distributed Denial of
Service, 簡稱DDoS)。
由於DDoS 攻擊是大量且分散的,沒有任何防護措施的伺服器,在受到DDoS
攻擊時,可能在數分鐘內就會被癱瘓,所以抵禦DDoS 攻擊的防禦措施很重要。
我們提出利用監測系統和重疊網路的技術來及時啟動防禦系統,隱藏服務主機的
位置,阻擋分散式阻絕服務攻擊,並提供正常的服務給合法使用者。重疊網路
(Overlay Network)係指利用Proxy 等技術,將某應用伺服器多點散布在廣大的
網路中,以達到增進網路安全之目的。在攻擊發生時,可以立刻有效的針對分散
的攻擊加以阻擋來保護伺服器。
我們藉由建立實體的測試網路來實驗我們所提系統的可行性。實驗結果證明
本系統可以有效的阻擋攻擊。
Many attacks on the internet reveal much vulnerability in recent years
that more emphasizes the importance of the security of Internet. Among
them, DDoS causes the largest damage.
Due to DDoS attack is huge and distributed, so that the servers with
no protection may be to become paralyzed under attacks in several minutes.
So the defense mechanism against DDoS is very important. We proposal is
that using detection system and overlay network to start defense system
in time, to hide the location of servers, to resist DDoS attacks and to
provide services to legitimate users. What Overlay Network means is that
using proxy to distribute some service server over the internet, so that
to achieve the purpose of enhancing internet security. When attacks
happens, it can effectively resist distributed attacks to protect
servers.
We use the physical topology to experiment the practice of our system.
The result of our experiment evidenced that our system cat effectively
resist attacks.
摘要................................................................................................................................ I
ABSTRACT ......................................................................................................................II
目錄............................................................................................................................. III
圖目錄..........................................................................................................................V
表目錄........................................................................................................................ VI
第一章 緒論.................................................................................................................1
1.1 研究背景................................................................................................................1
1.2 研究動機................................................................................................................2
1.3 論文架構................................................................................................................2
第二章 相關研究.........................................................................................................3
2.1 分散式阻斷服務....................................................................................................3
2.2 分散式阻斷服務的分類........................................................................................5
2.3 現有的防禦策略....................................................................................................7
2.3.1 實驗室的成果............................................................................................7
2.3.2 TRACEBACK .....................................................................................................8
2.3.3 PUSHBACK .......................................................................................................9
2.3.4 D-WARD ......................................................................................................10
2.3.5 OVERLAY NETOWRK .........................................................................................11
第三章 系統架構.......................................................................................................15
3.1 OVERLAY DEFENSE SYSTEM 架構.................................................................................15
3.2 系統流程..............................................................................................................17
3.3 系統功能模組......................................................................................................18
3.3.1 MONITOR AGENT.............................................................................................20
3.3.2 IDENTIFICATION AGENT .................................................................................20
3.3.3 PROXY AGENT................................................................................................23
第四章 系統實作.......................................................................................................24
4.1 系統功能模組實作..............................................................................................24
4.1.1 MONITOR AGENT.............................................................................................24
4.1.2 IDENTIFICATION AGENT .................................................................................26
4.1.3 PROXY AGENT................................................................................................27
4.2 系統實驗網路環境..............................................................................................27
4.3 討論......................................................................................................................29
第五章 模擬實驗測試...............................................................................................31
5.1 沒有防禦系統的攻擊情形..................................................................................31
5.2 有防禦系統的攻擊情形......................................................................................36
第六章 結論與未來工作...........................................................................................41
6.1 結論......................................................................................................................41
6.2 未來工作..............................................................................................................41
參考文獻.....................................................................................................................42
[1] Rocky K. C. Chang, “Defending against Flooding-Based Distributed
Denial-of-Service Attacks: A Tutorial,” IEEE Communications Magazine, Oct.
2002, pp. 42-51.
[2] Jelena Mirkovic and Peter Reiher, “A Taxonomy of DDoS Attack and DDoS
Defense Mechanisms,” ACM SIGCOMM Computer Communications Review, Apr.
2004, Vol. 34, No. 2, pp. 39-54.
[3] Alefiya Hussain, John Heidemann and Christos Papadopoulos, “A Framework for
Classifying Denial of Service Attacks,” ACM SIGCOMM, Augest 2003, pp.
99-110.
[4] Andrey Belenky and Nirwan Ansari, “On IP Traceback,” IEEE Communication
Magazine, July 2003, pp. 142-153.
[5] Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioammidis, Vern Paxson
and Scott Shenker, “Aggregate-Base Congestion Control,” ICSI Center for
Internet Research (ICIR) AT&T Labs Research.
[6] John Ioammidis and Steven M. Dellovin, “Implementing Pushback: Router-Based
Defense Against DDoS Attack,” Proc. Network and Distributed System Security
Symp., pp.6–8.
[7] Jelena Mirkovic, Gregory Prier and Peter Reiher, “Attacking DDoS at the Source,”
Proceedings of ICNP 2002, Nov. 2002, pp. 312-321.
[8] Ju Wang, Linyuan Lu and Andrew A. Chien, “Tolerating Denial-of-Service
Attacks Using Overlay Networks – Impact of Topology,” ACM SSRS 2003, Oct.
2003.
[9] A. D. Keromytis, V. Misra, and D. Rubenstein, “SOS: Secure Overlay Services,”
Proc. ACM SIGCOMM, Aug. 2002, pp. 61-72.
[10] A. D. Keromytis, V. Misra, and D. Rubenstein, “SOS: An Architecture for
Mitigating DDoS Attacks,” IEEE JOURNAL ON SELECTED AREAS IN
COMMUNICATIONS, Vol. 22, No. 1, Jan. 2004.
[11] D. L. Cook, W. G. Morein, A. D. Keromytis, V. Misra and D. Rubenstein,
“WebSOS: Protecting Web Servers from DDoS Attacks,” 11th IEEE International
Conference 2003, pp. 461-466.
[12] W. G. Morein, A. Stavrou, D. L. Cook, A. D. Keromytis, V. Misra and D.
Rubenstein, “Using Graphic Turing Tests To Counter Automated DDoS Attacks
Against Web Servers,” CCS’03, Oct. 2003.
[13] Angelos Stavrou, Angelos D. Keromytis, Jason Nieh, Vishal Misra and Dan
Rubenstein, “MOVE: An End-to-End Solution To Network Denial of Service,”
Internet Society NDSS’05, Feb. 2005.
[14] Steven Osman, Dinesh Subhraveti, Gong Su and Jason Nieh, “The Design and
Implementation of Zap: A System for Migrating Computing Environments,”
Proc. Of the 5th Symposium on Operating Systems Design and Implementation,
Dec. 2002.
[15] Min Cai, Kai Hwang, Yu-Kwong Kwok, Shanshan Song and Yu Chen,
“Collaborative Internet Worm Containment,” IEEE SECURITY & PRIVACY,
2005, pp. 24-33
[16] Vinod Yegneswaran, Paul Barford and Somesh Jha, “Global Intrusion Detection
in the DOMINO Overlay System,” Computer Sciences Department, University
of Wisconsin, Madison.
[17] 謝彥偉, “分散式阻斷服務下之過載保護機制, �� 國立中央大學資訊工程
所碩士論文, 民國93 年.
[18] 參考網站
http://www.cert.org/
[19] 參考網站
http://www.sans.org/
[20] 參考網站
http://www.insecure.org/
[21] 參考網站
http://www.securityfocus.com/
[22] 參考網站
Microsoft Security Home Page
http://www.microsoft.com/security/default.mspx
[23] 參考網站
D-WARD: DDoS Network Attack Recognition and Defense
http://www.lasr.cs.ucla.edu/ddos/
[24] 參考網站
DDoS attack tool timeline
http://staff.washington.edu/dittrich/talks/sec2000/timeline.html
[25] 參考網站
Tfn attack tool analysis
http://staff.washington.edu./dittrich/misc/tfn.analysis.txt
[26] 參考網站
stacheldraht attack tool analysis
http://staff.washington.edu./dittrich/misc/stacheldraht.analysis.txt
[27] 參考網站
TFN2K attack tool analysis
http://packetstormsecurity.com/distributed/TFN2K_Analysis-1.3.txt
[28] 參考網站
shaft attack tool analysis
http://home.adelphi.edu/~spock/shaft_analysis.txt
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 林劭仁(2002)。升高中推薦甄選與申請入學學生學業表現之探究。教育研究資訊,10(1),85-107。
2. 林世華(2000)。跨世紀的測驗發展計畫:國民中學學生基本學力測驗發展研究。教師天地,109,4-8。
3. 李正智(2005)。高中職進修學校的轉型迷思。師友月刊,457,35-38。
4. 何益川、陳世程(2004)。高職學生參加四技二專統一學測總分與各考科目之關聯度分析-以國立三重商工為例。三重商工學報,1-22。
5. 林騰蛟(1995)。技職校院多元入學制度之理念與改革。技術及職業教育,27,26-29。
6. 洪仁進、簡成熙、徐振邦、朱盈潔(1999)。台灣升學機制及升學競爭之簡介。教育研究資訊,7(6),11-20。
7. 陳一如、李弘斌 (2000)。入學方式對學生入學後成績表現之影響。技術學刊,15(3),423-430。
8. 陳一如、李弘斌(1999)。多元入學方案與學生教育成果之探討。景文技術學院學報。9(2),1-19。
9. 陳天寶、楊泯榕(2000)。高職多元入學學生學習成就之分析研究。大安高工學報,11,23-33。
10. 陳順利(2001)。原、漢青少年飲酒行為與學業成就之追蹤調查-以台東縣關山地區為例。教育與心理研究,24,67-98。
11. 楊豪森(2002)。高職教育面臨的衝擊。技術及職業教育雙月刊,69,48-49。
12. 葉倩亨(2002)。從多元角度談國中生的多元入學輔導。學生輔導,78,46-57。
13. 鄒浮安(1997)。多元方式入學的高中學生教育成就與身心健康之比較研究--自學方案 分發、高中聯考及數理資優甄選。教育資料文摘,39(4),63-88。
14. 廖進發、鄒浮安(1995)。多元入學的高中學生之大學聯成績與高中學業成績之追蹤研究-以高雄中學為例。雄中學報,2,365-405。
15. 蔡文吟(2001)。大安高工附設進修學校新生適應調查分析報告。大安高工學報,11,171-177。