一款小巧简单的DDOS监测工具DDOS_Monitor (windows平台下),可以用来检测判断网络状态,不需安装,直接解压缩使用。
下面是说明文档
———————————————–
FortGuard DDoS Attack Monitor ver 1.3
. True green software, no need to install.
. The best tools to monitor and analyze DDoS attacks.
System Requirements:
Microsoft Windows 2000/2003 Server
Have you ever encountered the following situations?
. Your website access is suddenly very slow or even unreachable
. Your online game players disconnected all of a sudden
. inetinfo.exe, w3wp.exe or database process made CUP occupation rate very high
If the hardware problem could be excluded, you are probably facing DDoS attack! How to verify, monitor and analyze the attack? Run FortGuard DDoS Attack Monitor and check first!
On the common sense,
. SYN Packets/s > 100: SYN Flooding attack.
. ACK Packets/s > 500: ACK Flooding attack. (But for the downloading website, ACK Packets/s could possibly get to more than 1000)
. ICMP Packets/s > 50: ICMP Flooding attack.
. UDP Packets/s number is small while bandwidth occupation is high: UDP Flooding attack possibly.
. CPU occupation rate is more than 80%, and it is mostly caused by inetinfo.exe, w3wp.exe or database process: Vicious TCP Flooding attack.
FortGuard DDoS firewall can protect against all attacks above.
FortGuard DDos Protection
FortGuard provides the most reliable and fastest DDoS protection for online enterprises, public & media services, essential infrastructure and Internet service providers. Under attack? Please feel free to contact us.
MSN SalesOnline win@fortguard.com (Winston)
Technical Support support@fortguard.com
Copyright(C)2003-2009 FortGuard Software Technologies Ltd. All rights reserved.
down from www.xdowns.com
———————————————–
点此下载:DDOS_Monitor (211K)
延伸阅读
- DDoS deflate:linux下防DDOS工具
- 用LINUX系统DDOS攻击WINDOWS
- DDOS攻击四大工具及使用剖析,与DDOS防范措施(图)
- 预防DDOS攻击方法集锦总结
- DDoS表现及如何判断遭受到了DDoS攻击
- linux下通过iptables限制同一IP连接数防CC/DDOS攻击
- 使用WinAirCrackPack在windows下快速破解无线网络密码
- CentOS的安全配置
- 无线密码破解工具一览简介
- 无线路由MAC地址过滤安全可靠性讨论/如何实现,真的有效吗,如何防范
- 使用pam模块pam_tally2设置Linux用户连续N次输入错误密码自动锁定X分钟
- 正确看待Linux操作系统的“安全”
- apache安全配置:禁用目录的php执行权限
- SQL盲注攻击技术概览综述
- 五个方法打造安全无线网络/无线网络安全设置
0 条评论。