【24h】

Nessi2 simulator for large-scale DDoS attack analysis

机译:Nessi2仿真器,用于大规模DDoS攻击分析

获取原文

摘要

The aim of the article is to thoroughly analyze the possibilities and techniques of performing strategic cyberattacks on an internetwork, such as the Internet. The main focus will be on large-scale distributed denial-of-service (DDoS) attacks for three primary reasons. Firstly, they appear to have the biggest infrastructural requirements and require coordinated, simultaneous effort to be effective on the scale desired to impact the majority of a victim country, territory or corporation. Such requirements can only be met with significant resources, often associated with powerful organizations and governments. Secondly, in the most notable cyberattacks of the last few years — the 2007 Estonia attacks and the 2008 South Ossetia attacks — DDoS was the primary asset. Thirdly, in these attacks DDoS has proven to be very powerful and debilitating for the victim. These three reasons provide solid grounds to believe that a strategic, large-scale DDoS attack on core network elements will be the tool of choice in at least some of the future military cyberconflicts.
机译:本文的目的是彻底分析在互联网(例如Internet)上进行战略性网络攻击的可能性和技术。出于以下三个主要原因,主要重点将放在大规模分布式拒绝服务(DDoS)攻击上。首先,它们似乎具有最大的基础设施要求,并且需要协调一致的同时努力才能在希望的规模上有效,以影响大多数受害国,领土或公司。通常只有与强大的组织和政府相关联的大量资源才能满足这些要求。其次,在过去几年中最引人注目的网络攻击中(2007年爱沙尼亚袭击和2008年南奥塞梯袭击),DDoS是主要资产。第三,在这些攻击中,DDoS已被证明非常强大,并且使受害者感到虚弱。这三个原因使我们有理由相信,对核心网络元素的战略性大规模DDoS攻击将成为至少将来某些军事网络冲突的首选工具。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号