diplomsko delo
Abstract
V diplomskem delu so opisani navadni in distribuirani napadi, ki v danem trenutku onemogočajo uporabo spletnih storitev uporabnikom interneta. Zgradili smo tudi omrežje, v katerem smo simulirali distribuiran napad in predstavili rezultate.
Na začetku diplomskega dela se seznanimo s samim delovanjem napadov, zakaj vse se lahko napadi koristijo in komu lahko škodujejo. V nadaljevanju spoznamo splošne kategorije napadov in kako se delijo, predstavimo kdo vse so lahko tarče napadov in na katere tehnologije se lahko napad izvede. V praktičnem delu zgradimo omrežje s tremi virtualnimi napravami in na primeru prikažemo delovanje napada. Na koncu predstavimo rezultate in opišemo dogajanje.
Keywords
spletna varnost;varnost računalniških sistemov;računalniški sistemi;spletne storitve;distribuirani napadi;protokoli;diplomske naloge;
Data
Language: |
Slovenian |
Year of publishing: |
2015 |
Typology: |
2.11 - Undergraduate Thesis |
Organization: |
UM FERI - Faculty of Electrical Engineering and Computer Science |
Publisher: |
[J. Verbančič] |
UDC: |
004.775.056(043.2) |
COBISS: |
19046422
|
Views: |
737 |
Downloads: |
100 |
Average score: |
0 (0 votes) |
Metadata: |
|
Other data
Secondary language: |
English |
Secondary title: |
SIMPLE AND DISTRIBUTED DENIAL OF SERVICE ATTACKS |
Secondary abstract: |
The thesis outlines simple and distributed denial-of-service attacks which at a given moment disable the use of web services for the internet users. In the context of this thesis the author also constructed a network, in which he simulated a distributed denial-of-service attack, and presented the results.
At the beginning of the thesis the author introduces the basic function of the attacks, together with their range of beneficial and harmful purposes. Furthermore, the general categories of the attacks are outlined. Hereafter the author presents who can be a target of the attack and which technologies can be harmed with such attacks.
The practical part of the thesis shows the construction of the network with three virtual devices and presents the function of an attack on a given example. In conclusion, the author outlines the results and describes the developments. |
Secondary keywords: |
computer security;web services;security;distributed attacks;computer systems;protocols; |
URN: |
URN:SI:UM: |
Type (COBISS): |
Bachelor thesis/paper |
Thesis comment: |
Univ. v Mariboru, Fak. za elektrotehniko, računalništvo in informatiko, Informatika in tehnologije komuniciranja |
Pages: |
41 f. |
ID: |
8772702 |