跳到主要內容

簡易檢索 / 詳目顯示

研究生: 吳家榮
Chia-Jung Wu
論文名稱: sP2SP: A Server Protection for P2SP
指導教授: 許富皓
Fu-Hau Hsu
口試委員:
學位類別: 碩士
Master
系所名稱: 資訊電機學院 - 資訊工程學系
Department of Computer Science & Information Engineering
論文出版年: 2020
畢業學年度: 108
語文別: 中文
論文頁數: 34
中文關鍵詞: 分散式阻斷服務點對服務器和點
外文關鍵詞: DDoS, P2SP
相關次數: 點閱:13下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  •   隨著 IoT 設備的成長,以及資安研究的發展,許多已經安裝在世界各地的 IoT 裝置被發現漏洞,而其中一部分甚至無法進行更新、補丁,最終被駭客所利用,組成殭屍網路,進而對網路服務商進行分散式阻斷服務攻擊(Distributed Denial of Service,DDoS),使網路服務商暫時中斷或停止服務,讓正常用戶無法存取,進而造成服務商與使用者在財務與時間上的損失。
      P2SP 是一種整合 P2P 以及 P2S 的技術,有 P2S 可靠與穩定的傳輸,以及 P2P 下載速度高的優點,但依然有著與 P2S 一樣的缺點,一但 Server 遭受 DoS 或者 DDoS 攻擊,使用者將無法完整下載檔案。
      本論文設計一套系統,名為 sP2SP,在 P2SP 系統遭到 DoS 或者DDoS 攻擊時,正在下載的使用者依然可以完整下載檔案。


    With the growth of IoT devices and the development of security research, many IoT devices that have been installed around the world have been found to have vulnerabilities , and some of them cannot even be updated or patched, and are eventually used by hackers to form botnets. A distributed denial of service (DDoS) attack on the network service provider caused the network service provider to temporarily interrupt or stop the service, making ordinary users inaccessible, thereby causing financial and time losses to the service provider and users.
    P2SP is a technology that integrates P2P and P2S. It has the advantages of reliable and stable transmission like P2S and high download speed like P2P, but it still has the same disadvantages as P2S. Once the server is attacked by DoS or DDoS, users will not be able to download the complete file.
    We designs a system called sP2SP. When the sP2SP system is attacked by DoS or DDoS, the user who is downloading can still download the entire file.

    中文摘要 i Abstract ii 誌謝 iii 目錄 iv 圖目錄 v 表目錄 vi 第1章 緒論 1 第2章 背景介紹 4 2.1 DDoS 4 2.2 DDoS攻擊分類 5 第3章 相關研究 7 3.1 CDN 7 3.2 P2SP 8 第4章 系統設計 10 4.1 sP2SP簡介 11 4.2 sP2SP流程 12 4.3 Peer Server 16 第5章 實驗設計與實作 17 5.1 測試環境 17 5.2 效用測試 18 5.3 效能測試 18 第6章 討論 20 6.1 限制 20 6.2 未來研究 20 第7章 結論 22 參考文獻 23

    [1] “Growth in Internet of Things Devices”https://priceonomics.com/the-iot-data-explosion-how-big-is-the-iot-data/ (Accessed on 6/30/2020)
    [2] “DDoS attacks in Q1 2020” , https://securelist.com/ddos-attacks-in-q1-2020/96837/ (Accessed on 6/30/2020)
    [3] “Content delivery network (CDN)” https://en.wikipedia.org/wiki/Content_delivery_network (Accessed on 6/30/2020)
    [4] “P2SP(Peer to Server and to Peer)”https://zh.wikipedia.org/wiki/P2SP (Accessed on 6/30/2020)
    [5] ZhiYao Zhong, “Handover: A Mechanism to Improve the Availability of Network Services after Live Migration under Private Networks,” National Central University, Master's degree, Jun 2016.
    [6] Hung, Ruei-yih, “Migmod: A Mechanism to Establish a TCP/IP Connection under DDoS Attacks” National Central University, Master's degree, Jun 2019.

    QR CODE
    :::