39 | Case: How to alleviate the performance degradation caused by DDoS attacks?

In the previous section, we learned how to use tcpdump and Wireshark, and through several cases, we took you to use these two tools to actually analyze the network sending and receiving process. When encountering network performance problems, don’t forget to use tcpdump and Wireshark, two powerful tools, to capture the actual transmitted network packets […]

[Cloud Computing Network Security] DDoS Mitigation Analysis: DDoS attack mitigation strategies, choosing the best provider and key considerations

Article directory I. Introduction 2. What is DDoS mitigation? 3. DDoS Mitigation Stage 4. How to choose a DDoS mitigation provider 4.1 Network capacity 4.2 Processing capabilities 4.3 Scalability 4.4 Flexibility 4.5 Reliability 4.6 Other considerations 4.6.1 Pricing 4.6.2 Direction of focus At the end of the article, a book titled “Secure Circulation of Data […]

10. DPDK protocol stack: ddos and epoll

Similarly, we iterate in the previous code and add ddos and epoll to implement concurrency functions. DDOS Here, ddos “borrows” from the Internet, but doesn’t go into too much detail, as long as it can be used. code show as below: #if ENABLE_DDOS_DETECT // If DDoS attack detection is enabled #define CAPTURE_WINDOWS 256 static double […]

Wireshark reveals DDoS as it really is

1 Foreword MTU, transmission speed, congestion control, or various retransmissions, core concepts related to TCP transmission: Learned RFC specifications and specific Linux implementations Apply this knowledge flexibly through cases This kind of discussion is still within the broad framework of protocol specifications. The default premise is that both ends of the communication work in accordance […]

SDN Experiment: Using mininet and RYU to implement DDoS attack and defense simulation

Recurrence paper: Research on DDoS by simulating SDN architecture based on mininet platform (Qian Zhenyong) refer to: Detection and Mitigation of DDoS Abnormal Attacks Based on SDN Environment–Experiment_Download the floodlight source_The blog of programmers who don’t understand development-CSDN Blog Use mininet to simulate SDN architecture and conduct DDoS attack and defense simulation (Ryu + mininet […]

Principles of DDoS and CC Attacks (Part 2)

0. Foreword This topic studies the implementation principles and specific implementation methods of DDoS and CC, and explains how to detect and protect them. The article is divided into (upper) (middle) (lower) three, (Part 1) mainly describes the basic principles of DDoS and the basis and ideas for implementing attacks; (middle) Mainly list the methods […]

MHDDoS: A DDoS Testing Tool Containing 56 Techniques

About MHDDoS MHDDoS is a powerful DDoS server/site security testing tool, which contains 56 techniques, which can help researchers to perform DDoS security testing on their own servers or websites. Tool technology Layer7 GET | GET flood POST | POST flooding OVH | Bypass OVH RHEX | random HEX STOMP | Bypass chk_captcha STRESS | […]

(Nested virtual machine) ovs+floodlight builds sdn – simulates and detects ddos attacks

Reference blog post-CSDN-Jiugua (Author)-Using OpenvSwitch + KVM to build an SDN network and complete process ovs installation under ubuntu: sudo apt-get install -qy openvswitch-switch openvswitch-common The following ovs installation is cumbersome and not recommended For ovs installation, the corresponding version is required, use uname -a to view the internal and version, and connect to the […]

Computer network day12 TCP’s three-way handshake and four-way handshake (detailed process) – Port scanning script – Socket types – Network attack methods (SYN flood attack, DOS attack, DDOS attack, CC attack)

Directory TCP header encapsulation Experiment: If I need to know the 6 ports of a certain machine, which ports 22 23 25 3306 80 8000 are open and which are not? How to do it? shell script: python script: Socket classification: network socket and file socket Reference article (GOOD): 4.1 TCP three-way handshake and four-way […]