Research Article

[Retracted] Computer Network Information Security Monitoring System Based on Big Data Era

Table 5

Attack software required for testing.

SequenceSoftwareSpecific classification

1Network information scanning toolHping, Nmap
2Distributed denial of service toolWinNuke, Land, Jolt
3Database attack toolMySQL
4Mail server attack toolImapd exploit
5FTP server attack toolServ-U attack
6We server attack toolHttpd