- 1、本文档共47页,可阅读全部内容。
- 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
ddos攻击
摘 要
?
随着计算机技术的发展,网络也在迅猛地普及和发展。人们在享受着网络带来的各种便利的同时,也受到了很多黑客的攻击。在众多的攻击种类中,有一种叫做 DoS(Denial of Service 拒绝服务)的攻击,是一种常见而有效的网络攻击技术,它通过利用协议或系统的缺陷,采取欺骗或伪装的策略来进行网络攻击,最终使得受害者的系统因为资源耗尽或无法作出正确响应而瘫痪,从而无法向合法用户提供正常服务。它看上去平淡无奇,但是攻击范围广,隐蔽性强、简单有效而成为了网络中一种强大的攻击技术,极大地影响了网络和业务主机系统的有效服务。其中,DDoS(Distubuted Denial of Service 分布式拒绝服务)更以其大规模性、隐蔽性和难防范性而著称。
本论文首先研究了Linux系统以及运行于该系统的应用程序漏洞,分级讨论了防御对Linux服务器攻击的方法,并着重介绍了Linux文件系统的安全问题。其次,从Linux基本安全机制、数据传输加密和Linux防火墙等方面来讨论了如何构建安全的Linux系统。还有就是介绍了对Linux系统内核进行修改以达到防御DoS攻击的效果。并对Linux网络安全的未来发展做出了展望。
?
关键词:DoS;Ddos; Linux
?
?
Abstract
?
With the development of the computer technology, network is rapidly popularizingand developing. When enjoying the benefits arsing from network, people are on theother hand facing the attack of Hackers, one of which attack is named DoS (Denial of Service) attack. The DoS is an effective and usual network attack technique, whichemploys the bugs of protocols or systems to launch the attack in a disguisd or fake wayand finally disables the victim computer due to resources exhcaust and failure toreponse properly and results in the failure to supply normal service to legitimateusers.Such attack appears ordinary .However it is simple but effective with a wide scopeof attack and high degree of hiding,which to great extent affects the effective service of network and operational host.Among the other things,DDoS (Distubuted Denial of Service) is more notorious of its massive scale,hiding and difficutly of defending.
This thesis, firstly, studied the Linux system and some leaks of the applications running on it, discussed the ways how to defend the attacks to Linux servers, and introduced the security of Linux file systems.Secondly, it discussed how to set up a safe Linux system in the way of basic safety mechanism, data delivering encrypts, firewall and so on.Finally, it still analyzed Linux sniffer software. In view of the disadvantages of that software, I thought out a new-fashioned sniffer in terms of the actual,Still have is
文档评论(0)