Research Article

Defending Application Layer DDoS Attacks via Multidimensional Parallelotope

Table 2

Hardware and software environment configuration of attack nodes.

Device/softwarePerformance/function

ROM2 GB
Processor1
RAM60 GB
Windows, Ubuntu operating systemInstall test software and perform access service
Kali attack toolSimulate various attacks and penetration tests
WiresharkCapture packets and get messages
Burp SuiteIntercept log messages
LOICPackage tool
JMeterWebsite stress test tool
VMware WorkstationSimulate attack nodes