| Internet has become popular around the world because of its wide openness, connection and share. An increasing number of enterprises rely on the internet with the development of internet technology. The convenient communication and low cost have enabled the organization modes to change a lot. Comparing the traditional way, many enterprises prefer to prove information to internet and deploy the resources inside and outside by coordinating the information system. Meanwhile, enterprises can find more partners and have more opportunities on internet. Both of them make cooperation and achieve unimaginable profits. However, the inside and outside of the security threats in enterprises will bring enormous disasters at anytime. As we all know, the risk is too high and we cannot evaluate it. We should concern how to make a system for protecting the internet to enterprises.With the increasing destroy trend of DDOS System, professional anti-DDOS System has been in urgent need. However, the tendency of DDOS attack requires the real-time, transparent and easy to get anti-DDOS System. In other words, for most end-users, anti-DDOS System can enable protection at the right time of attack and reduce the severity. The whole process should be transparent to clients and they should be no need for human intervention. Those medium and small-sized clients, who are unable to use anti-DDOS System, should get the shared anti-DDOS System to obtain better security service with lower cost. The anti-DDOS System in the paper adopted the advanced data-stream finger filter techniques to provide perfect protection for known and unknown DDOS attack. The system can be divided into eight modules which are status module, stream tractor module, configuration module, rule module, domain name filter module, log module, plug-in management module and system configuration module. Regarding the server list module and stream tractor module as the core, this article provides the survey on the system and requirements definition firstly. Then it gives function design and system analysis. Moreover, it illustrates coding and system testing. Finally, it is project implementation and maintenance description and optimization. |