Your browser does not allow JavaScript!
JavaScript is necessary for the proper functioning of this website. Please enable JavaScript or use a modern browser.
|
|
SLO
|
ENG
|
Cookies and privacy
DKUM
EPF - Faculty of Business and Economics
FE - Faculty of Energy Technology
FERI - Faculty of Electrical Engineering and Computer Science
FF - Faculty of Arts
FGPA - Faculty of Civil Engineering, Transportation Engineering and Architecture
FKBV - Faculty of Agriculture and Life Sciences
FKKT - Faculty of Chemistry and Chemical Engineering
FL - Faculty of Logistic
FNM - Faculty of Natural Sciences and Mathematics
FOV - Faculty of Organizational Sciences in Kranj
FS - Faculty of Mechanical Engineering
FT - Faculty of Tourism
FVV - Faculty of Criminal Justice and Security
FZV - Faculty of Health Sciences
MF - Faculty of Medicine
PEF - Faculty of Education
PF - Faculty of Law
UKM - University of Maribor Library
UM - University of Maribor
UZUM - University of Maribor Press
COBISS
Faculty of Business and Economic, Maribor
Faculty of Agriculture and Life Sciences, Maribor
Faculty of Logistics, Celje, Krško
Faculty of Organizational Sciences, Kranj
Faculty of Criminal Justice and Security, Ljubljana
Faculty of Health Sciences
Library of Technical Faculties, Maribor
Faculty of Medicine, Maribor
Miklošič Library FPNM, Maribor
Faculty of Law, Maribor
University of Maribor Library
Bigger font
|
Smaller font
Introduction
Search
Browsing
Upload document
For students
For employees
Statistics
Login
First page
>
Show document
Show document
Title:
NAVADNI IN DISTRIBUIRANI NAPADI Z ONEMOGOČANJEM SPLETNIH STORITEV
Authors:
ID
Verbančič, Jan
(Author)
ID
Brumen, Boštjan
(Mentor)
More about this mentor...
Files:
VS_Verbancic_Jan_2015.pdf
(2,09 MB)
MD5: 6A97EE36EE0266631D5EB3B44F62EF79
Language:
Slovenian
Work type:
Bachelor thesis/paper
Typology:
2.11 - Undergraduate Thesis
Organization:
FERI - Faculty of Electrical Engineering and Computer Science
Abstract:
V diplomskem delu so opisani navadni in distribuirani napadi, ki v danem trenutku onemogočajo uporabo spletnih storitev uporabnikom interneta. Zgradili smo tudi omrežje, v katerem smo simulirali distribuiran napad in predstavili rezultate. Na začetku diplomskega dela se seznanimo s samim delovanjem napadov, zakaj vse se lahko napadi koristijo in komu lahko škodujejo. V nadaljevanju spoznamo splošne kategorije napadov in kako se delijo, predstavimo kdo vse so lahko tarče napadov in na katere tehnologije se lahko napad izvede. V praktičnem delu zgradimo omrežje s tremi virtualnimi napravami in na primeru prikažemo delovanje napada. Na koncu predstavimo rezultate in opišemo dogajanje.
Keywords:
distribuirani napadi
,
varnost
,
računalniški sistemi
,
spletne storitve
,
protokoli
Place of publishing:
Maribor
Publisher:
[J. Verbančič]
Year of publishing:
2015
PID:
20.500.12556/DKUM-48486
UDC:
004.775.056(043.2)
COBISS.SI-ID:
19046422
NUK URN:
URN:SI:UM:DK:JPCGMOIU
Publication date in DKUM:
08.07.2015
Views:
1227
Downloads:
143
Metadata:
Categories:
KTFMB - FERI
Cite this work
Plain text
BibTeX
EndNote XML
EndNote/Refer
RIS
ABNT
ACM Ref
AMA
APA
Chicago 17th Author-Date
Harvard
IEEE
ISO 690
MLA
Vancouver
:
VERBANČIČ, Jan, 2015,
NAVADNI IN DISTRIBUIRANI NAPADI Z ONEMOGOČANJEM SPLETNIH STORITEV
[online]. Bachelor’s thesis. Maribor : J. Verbančič. [Accessed 17 April 2025]. Retrieved from: https://dk.um.si/IzpisGradiva.php?lang=eng&id=48486
Copy citation
Average score:
0.5
1
1.5
2
2.5
3
3.5
4
4.5
5
(0 votes)
Your score:
Voting is allowed only for
logged in
users.
Share:
Searching for similar works...
Hover the mouse pointer over a document title to show the abstract or click on the title to get all document metadata.
Secondary language
Language:
English
Title:
SIMPLE AND DISTRIBUTED DENIAL OF SERVICE ATTACKS
Abstract:
The thesis outlines simple and distributed denial-of-service attacks which at a given moment disable the use of web services for the internet users. In the context of this thesis the author also constructed a network, in which he simulated a distributed denial-of-service attack, and presented the results. At the beginning of the thesis the author introduces the basic function of the attacks, together with their range of beneficial and harmful purposes. Furthermore, the general categories of the attacks are outlined. Hereafter the author presents who can be a target of the attack and which technologies can be harmed with such attacks. The practical part of the thesis shows the construction of the network with three virtual devices and presents the function of an attack on a given example. In conclusion, the author outlines the results and describes the developments.
Keywords:
distributed attacks
,
security
,
computer systems
,
web services
,
protocols
Comments
Leave comment
You must
log in
to leave a comment.
Comments (0)
0 - 0 / 0
There are no comments!
Back