首页> 外文期刊>International Journal of Applied Engineering Research >DDoS Attack Traceback and Chaosin a Distributed Network a Survey
【24h】

DDoS Attack Traceback and Chaosin a Distributed Network a Survey

机译:DDoS攻击回溯和分布式网络混乱调查

获取原文
获取原文并翻译 | 示例
           

摘要

In this paper an analysis and study on attacks and its impact on distributed networks is focused moreover, perticullarly on DDoS attack which stands for "Distributed Denial of Service". Essentially, people in governor of hundreds or thousands of different systems willshortest all of those computers to deluge the bandwidth offered to a given IP address. The resulting downpour "attack" serves to meritoriouslyterminateuser'sfacility to send or receive data on the internet. This can be done using a progression of techniques, such as by congestionthe routers knack to receive requests, or physically over-saturating your bandwidth such that no useful data can pass through. The exact method carried out in the research perspective according to many practitioners and research fellows is more important, though the concept that internet will be virtually unusable for 1-2 minutes while the attack is performed.
机译:本文还对攻击及其对分布式网络的影响进行了分析和研究,重点是DDoS攻击,DDoS攻击代表“分布式拒绝服务”。本质上,数百或数千个不同系统的州长中的人们将使所有这些计算机最短,以浪费为给定IP地址提供的带宽。随之而来的倾盆大雨“攻击”功不可没地终止了用户在Internet上发送或接收数据的能力。这可以使用一系列技术来完成,例如,拥塞路由器难以接收请求,或者物理上使您的带宽过饱和,从而使有用数据无法通过。尽管从概念上讲,在进行攻击时互联网实际上将在1-2分钟内无法使用,但许多从业人员和研究人员从研究角度执行的确切方法更为重要。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号