МОДЕЛЮВАННЯ DDoS-АТАКИ НА ВЕБ СЕРВЕР
Анотація
DDoS-attack on a web server modeling
The main reasons DoS-attack is the most popular attack type in the world are listed. Main features of DDoS-attacks are outlined. The real life case modeling of DDoS-attack on web server was performed. Conclusions drawn from the simulation results are presented.
Посилання
Юрій Ільїн, Головний редактор Kaspersky Business, Звіт “IT SECURITY RISKS SPECIAL REPORT SERIES”, [он-лайн]: https://cdn.press.kaspersky.com/ files/2015/09/ IT_Risks_Survey_Report_Threat_of_DDoS_Attacks.pdf.
Merike Kaeo, “Designing Network Security”, Cisco Press, oct 30, 2003; [он-лайн]: http:// www.ciscopress.com/store/designing-network-security-97815870 51173.
Визначення зі словника, [он-лайн]:
http://www.dictionary.com/browse/botnet (доступ, травень 2015).
Karsten Bsufka and Rainer Bye, NeSSi² Ver. 2.0.0-beta.3 Manual, [он-лайн]: http://es.osdn.jp/projects/sfnet_nessi2/downloads/nessi2/2.1.1-beta/NeSSi2Manual. pdf/ (доступ, травень 2015).і
##submission.downloads##
Опубліковано
Як цитувати
Номер
Розділ
Ліцензія
Авторське право (c) 2016 Орест Андрійович Лаврів, Роман Степанович Колодій, Зеновій Миронович Хархаліс, Володимир Якович Мосоров
Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.
Authors who submit to this conference agree to the following terms:a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.