Applying Splunk to Detect the Attack of Distributed Denial of Service
碩士 === 國立高雄應用科技大學 === 電子工程系碩士班 === 104 === In this thesis, we utilize the open source testing tools Hping3 and network analysis functions Scapy to simulate attacks including flood attacks, Distributed Denial of Service reflection attacks, and amplification attacks. The aggressive be-havior data is e...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2016
|
Online Access: | http://ndltd.ncl.edu.tw/handle/5zdcr9 |
id |
ndltd-TW-104KUAS0393041 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-104KUAS03930412019-05-30T03:50:24Z http://ndltd.ncl.edu.tw/handle/5zdcr9 Applying Splunk to Detect the Attack of Distributed Denial of Service 應用 Splunk 偵測阻斷式服務攻擊 LIU,CHAO-LIANG 柳昭良 碩士 國立高雄應用科技大學 電子工程系碩士班 104 In this thesis, we utilize the open source testing tools Hping3 and network analysis functions Scapy to simulate attacks including flood attacks, Distributed Denial of Service reflection attacks, and amplification attacks. The aggressive be-havior data is employed to accelerate the attack determination and to predict the possible hidden crises by applying the Splunk platform to do data analysis by using data generated from aggressive behavior, and determine accelerate the attacks and predict the possible hidden crisis. Applying the analysis of the result model to do data analysis and detect the attack of Distributed Denial of Service in the actual network environment. Finally, we performed gelocation Application Programming Interface lookup on internal IP addresses for making decision. Te-Jen Su 蘇德仁 2016 學位論文 ; thesis 52 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立高雄應用科技大學 === 電子工程系碩士班 === 104 === In this thesis, we utilize the open source testing tools Hping3 and network analysis functions Scapy to simulate attacks including flood attacks, Distributed Denial of Service reflection attacks, and amplification attacks. The aggressive be-havior data is employed to accelerate the attack determination and to predict the possible hidden crises by applying the Splunk platform to do data analysis by using data generated from aggressive behavior, and determine accelerate the attacks and predict the possible hidden crisis. Applying the analysis of the result model to do data analysis and detect the attack of Distributed Denial of Service in the actual network environment. Finally, we performed gelocation Application Programming Interface lookup on internal IP addresses for making decision.
|
author2 |
Te-Jen Su |
author_facet |
Te-Jen Su LIU,CHAO-LIANG 柳昭良 |
author |
LIU,CHAO-LIANG 柳昭良 |
spellingShingle |
LIU,CHAO-LIANG 柳昭良 Applying Splunk to Detect the Attack of Distributed Denial of Service |
author_sort |
LIU,CHAO-LIANG |
title |
Applying Splunk to Detect the Attack of Distributed Denial of Service |
title_short |
Applying Splunk to Detect the Attack of Distributed Denial of Service |
title_full |
Applying Splunk to Detect the Attack of Distributed Denial of Service |
title_fullStr |
Applying Splunk to Detect the Attack of Distributed Denial of Service |
title_full_unstemmed |
Applying Splunk to Detect the Attack of Distributed Denial of Service |
title_sort |
applying splunk to detect the attack of distributed denial of service |
publishDate |
2016 |
url |
http://ndltd.ncl.edu.tw/handle/5zdcr9 |
work_keys_str_mv |
AT liuchaoliang applyingsplunktodetecttheattackofdistributeddenialofservice AT liǔzhāoliáng applyingsplunktodetecttheattackofdistributeddenialofservice AT liuchaoliang yīngyòngsplunkzhēncèzǔduànshìfúwùgōngjī AT liǔzhāoliáng yīngyòngsplunkzhēncèzǔduànshìfúwùgōngjī |
_version_ |
1719194383174074368 |