Research Article
[Retracted] Computer Network Information Security Monitoring System Based on Big Data Era
Table 5
Attack software required for testing.
| Sequence | Software | Specific classification |
| 1 | Network information scanning tool | Hping, Nmap | 2 | Distributed denial of service tool | WinNuke, Land, Jolt | 3 | Database attack tool | MySQL | 4 | Mail server attack tool | Imapd exploit | 5 | FTP server attack tool | Serv-U attack | 6 | We server attack tool | Httpd |
|
|