In this study an attack was organized and packet fi ltering settings were imple

In this study an attack was organized and packet fi

This preview shows page 755 - 757 out of 923 pages.

In this study, an attack was organized, and packet fi ltering settings were imple- mented to protect against the DDoS attacks of the software system. 4 Modeling DDoS-Attacks and Organizing Protection Against It 4.1 Organizing the Work of the Network of Virtual Machines During our study we organized a network of virtual machines. We called it a Workspace ( polygon ). Then we ran DDoS attack on it. The study was implemented on virtual machines Oracle VM Virtual Box software. After installing the Oracle VM VirtualBox, based on this software, 3 virtual machines were created. On all machines, various operating systems of the Linux family were installed. On the fi rst virtual machine we installed operating system Linux Ubuntu. The attack was applied on this machine (on one of the open ports). In order to open the port to receive packets, the Apache HTTP Server was installed on the virtual machine. Also, in this virtual machine, to protect from the DDoS attack, we have modi fi ed the fi rewall con fi gurations for fi ltering packets. The second virtual machine was based on the CentOS operating system on which the Zabbix monitoring system was installed. On the third machine, we installed the operating system Kali Linux to implement the DDoS attack itself. For this, the Torshammer software was used. Next, we established the network between all the virtual machines. The Oracle VM VirtualBox software allows us to fi nd the physical Ethernet connections on the main machine, and on their basis build the network structure of virtual machines. Estimation of the Degree of Reliability and Safety of Software Systems 747
Image of page 755
Network settings in this program allows us to select several options for distributing computers in the network of virtual machines. If necessary, you can even throw them in different VLANs. In this case, the settings of the created NAT network were used. It allows virtual machines to be in the same network and at the same time have an Internet connection (via a physically connected Ethernet connection). Then, the received settings were checked on the machines themselves, in order to make sure that they are on the same subnet, and that there is no IP address con fl ict. As a result, the server on CentOS received the address 10.0.2.5, Linux Ubuntu with the open port received the IP address 10.0.2.4 (Fig. 1 ), and Kali Linux 10.0.2.6. 4.2 Installing Zabbix Computer Network Monitoring System As already described above, the Zabbix monitoring system was installed on the server, allowing us to monitor incoming traf fi c. The result of the DDoS attack was monitored using it. Zabbix is considered as a universal monitoring system, as it consists of several parts: (1) The Server of monitoring. (2) Databases (MySQL, PosthreSQL, SQLite or Oracle). (3) Web-interface, presented in PHP.
Image of page 756
Image of page 757

You've reached the end of your free preview.

Want to read all 923 pages?

  • Fall '19
  • IP address, Network address translation, IPv4 address exhaustion

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes