To learn more about DoS/related attacks, I:
- built a socket-level web-server, hosting some demo applications.
- developed various DoS/DDoS/etc attacks to successfully attack the server
- Implemented security mechaisms to protect the server against such attacks
A documentation of my notes / research is available in report.pdf above.
Example client website, hosted on server (there are a few, in the /client_websites directory:
Effect of attacks after server fortifications:
- to start web server, naavigate to /iteration1 (or /iteration2 for fortified), run
python3 web_server.py
. - to run a client website on the running server, on a browser visit the url of format:
server_URL:port/client_website_dir_name
. e.g.http://127.0.0.1:8080/messagingSite
- to run various attacks, open another terminal window, navigate to /attacker directory, run of format:
python3 ATTACK_NAME.py
.