ترجمه مقاله نقش ضروری ارتباطات 6G با چشم انداز صنعت 4.0
- مبلغ: ۸۶,۰۰۰ تومان
ترجمه مقاله پایداری توسعه شهری، تعدیل ساختار صنعتی و کارایی کاربری زمین
- مبلغ: ۹۱,۰۰۰ تومان
Abstract
Protection from DDoS-attacks is one of the most urgent problems in the world of network technologies. And while protect systems has algorithms for detection and preventing DDoS attacks, there are still some unresolved problems. This article is devoted to the DDoS-attack called Pulse Wave. Providing a brief introduction to the world of network technologies and DDoS-attacks, in particular, aims at the algorithm for protecting against DDoS-attack Pulse Wave. The main goal of this article is the implementation of traffic classifier that adds rules for infected computers to put them into a separate queue with limited bandwidth. This approach reduces their load on the service and, thus, firewall neutralises the attack.
IV.IMPLEMENTATION OF THE ATTACK
Then the attack on the server was simulated. To simulate a large number of attacking bots these python modules have been used in the network, as a subprocess and multiprocessing, with the help of which a copy of the process simulating the attack of the botnet nodes on the server was created. The results of the attack presented are graphs of CPU load and the number of unique IP addresses of senders (Fig. 4- 5).
At the moment of the beginning of the attack, the network sharply increases activity, the number of unique IP per unit time, it is these IP it was decided to mark suspicious. A sharp increase in the number of unique IP serves as a signal to the system that an attack has begun. Based on this information the binary IP address classifier was implemented, which allocates 2 classes based on network activity analysis: user requests and botnet requests. Blocking the botnet requests marked thus allowed to reduce the load on the server, avoiding for the most part the damage a from the attack.