Skoči na glavni sadržaj

Izvorni znanstveni članak

https://doi.org/10.19279/TVZ.PD.2017-5-1-08

DENIAL OF SERVICE ATTACK ANALYSIS IN REAL ENVIROMENT

Igor Džanko ; Tehničko veleučilište u Zagrebu, Zagreb, Hrvatska, Student
Ivica Dodig orcid id orcid.org/0000-0002-3005-9949 ; Tehničko veleučilište u Zagrebu, Zagreb, Hrvatska
Davor Cafuta orcid id orcid.org/0000-0001-9105-6699 ; Tehničko veleučilište u Zagrebu, Zagreb, Hrvatska
Renata Kovačević ; Tehničko veleučilište u Zagrebu, Zagreb, Hrvatska
Tin Kramberger orcid id orcid.org/0000-0001-5585-970X ; Tehničko veleučilište u Zagrebu, Zagreb, Hrvatska


Puni tekst: hrvatski pdf 2.051 Kb

str. 51-60

preuzimanja: 644

citiraj


Sažetak

Lately, the Internet has signifi cantly improved
and greatly enhanced communication and
business. More commercial usefulness
proportionally aff ects the amount of security
threats. The most common security threats
on the Internet are network attacks. The most
common network attack is based on disabling
normal communication. Network attacks that
focus on disabling communication are called
Denial of Service (DoS) attacks. A DoS attack
prevents access to users to communicate within
the attacked computer network, or prevent
the server to provide normal services. Various
mechanisms have been developed for the early
detection and prevention of DoS attacks on
diff erent levels of the network infrastructure.
There is a constant eff ort to create a new and
better model for communication. However,
methods of attack are also being developed. In
order to prevent blocking, a new form of attack
has evolved – Distributed Denial of Service
(DDoS) attacks. In a DDoS attack, the attackers
are distributed throughout the Internet. By using a
malicious distributed computer network (botnet)
an attack can be launched simultaneously by
thousands of compromised computers (bots).
Using a large network of infected computers, an
attack source can be additionally hidden by using
Distributive Refl ective DoS (DRDoS) attacks. In
this paper, we will present the diff erent versions
of DoS attacks. In a real network environment,
measurements show the signifi cance of the impact
on the operation of the network through server
availability. Additionally, the possibilities of
how to detect and prevent such attacks will be
proposed and their usefulness is discussed.

Ključne riječi

DDoS; Bloom fi lter; SYN/ACK

Hrčak ID:

194802

URI

https://hrcak.srce.hr/194802

Datum izdavanja:

15.11.2017.

Podaci na drugim jezicima: hrvatski

Posjeta: 1.419 *