Research Article
Defending Application Layer DDoS Attacks via Multidimensional Parallelotope
Table 2
Hardware and software environment configuration of attack nodes.
| Device/software | Performance/function |
| ROM | 2 GB | Processor | 1 | RAM | 60 GB | Windows, Ubuntu operating system | Install test software and perform access service | Kali attack tool | Simulate various attacks and penetration tests | Wireshark | Capture packets and get messages | Burp Suite | Intercept log messages | LOIC | Package tool | JMeter | Website stress test tool | VMware Workstation | Simulate attack nodes |
|
|