Applying Splunk to Detect the Attack of Distributed Denial of Service

碩士 === 國立高雄應用科技大學 === 電子工程系碩士班 === 104 === In this thesis, we utilize the open source testing tools Hping3 and network analysis functions Scapy to simulate attacks including flood attacks, Distributed Denial of Service reflection attacks, and amplification attacks. The aggressive be-havior data is e...

Full description

Bibliographic Details
Main Authors: LIU,CHAO-LIANG, 柳昭良
Other Authors: Te-Jen Su
Format: Others
Language:zh-TW
Published: 2016
Online Access:http://ndltd.ncl.edu.tw/handle/5zdcr9
id ndltd-TW-104KUAS0393041
record_format oai_dc
spelling ndltd-TW-104KUAS03930412019-05-30T03:50:24Z http://ndltd.ncl.edu.tw/handle/5zdcr9 Applying Splunk to Detect the Attack of Distributed Denial of Service 應用 Splunk 偵測阻斷式服務攻擊 LIU,CHAO-LIANG 柳昭良 碩士 國立高雄應用科技大學 電子工程系碩士班 104 In this thesis, we utilize the open source testing tools Hping3 and network analysis functions Scapy to simulate attacks including flood attacks, Distributed Denial of Service reflection attacks, and amplification attacks. The aggressive be-havior data is employed to accelerate the attack determination and to predict the possible hidden crises by applying the Splunk platform to do data analysis by using data generated from aggressive behavior, and determine accelerate the attacks and predict the possible hidden crisis. Applying the analysis of the result model to do data analysis and detect the attack of Distributed Denial of Service in the actual network environment. Finally, we performed gelocation Application Programming Interface lookup on internal IP addresses for making decision. Te-Jen Su 蘇德仁 2016 學位論文 ; thesis 52 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立高雄應用科技大學 === 電子工程系碩士班 === 104 === In this thesis, we utilize the open source testing tools Hping3 and network analysis functions Scapy to simulate attacks including flood attacks, Distributed Denial of Service reflection attacks, and amplification attacks. The aggressive be-havior data is employed to accelerate the attack determination and to predict the possible hidden crises by applying the Splunk platform to do data analysis by using data generated from aggressive behavior, and determine accelerate the attacks and predict the possible hidden crisis. Applying the analysis of the result model to do data analysis and detect the attack of Distributed Denial of Service in the actual network environment. Finally, we performed gelocation Application Programming Interface lookup on internal IP addresses for making decision.
author2 Te-Jen Su
author_facet Te-Jen Su
LIU,CHAO-LIANG
柳昭良
author LIU,CHAO-LIANG
柳昭良
spellingShingle LIU,CHAO-LIANG
柳昭良
Applying Splunk to Detect the Attack of Distributed Denial of Service
author_sort LIU,CHAO-LIANG
title Applying Splunk to Detect the Attack of Distributed Denial of Service
title_short Applying Splunk to Detect the Attack of Distributed Denial of Service
title_full Applying Splunk to Detect the Attack of Distributed Denial of Service
title_fullStr Applying Splunk to Detect the Attack of Distributed Denial of Service
title_full_unstemmed Applying Splunk to Detect the Attack of Distributed Denial of Service
title_sort applying splunk to detect the attack of distributed denial of service
publishDate 2016
url http://ndltd.ncl.edu.tw/handle/5zdcr9
work_keys_str_mv AT liuchaoliang applyingsplunktodetecttheattackofdistributeddenialofservice
AT liǔzhāoliáng applyingsplunktodetecttheattackofdistributeddenialofservice
AT liuchaoliang yīngyòngsplunkzhēncèzǔduànshìfúwùgōngjī
AT liǔzhāoliáng yīngyòngsplunkzhēncèzǔduànshìfúwùgōngjī
_version_ 1719194383174074368