Advanced DDoS Attacks Traffic Simulation with a Test Center Platform

DDoS attacks are one of the top security problems affecting networks and disrupting services to legitimate users. The vital step in dealing with this problem is the network’s ability to detect such attacks. To train and analyze countermeasures, researchers typically simulate the DDoS attacks traffic by either the specialized simulator (i.e. software, hardware) or the comprehensive testbed. This paper proposes the advanced implementations of a special simulatorbased simulation with Spirent Test Center platform, to simulate DDoS attacks traffic with/without simulated practical network traffic routing mechanisms.

[1]  Taekyoung Kwon,et al.  NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack , 2004, AIS.

[2]  Ming Li,et al.  Simulation Study of Flood Attacking of DDOS , 2008, 2008 International Conference on Internet Computing in Science and Engineering.

[3]  Calvin Ko,et al.  SEER: A Security Experimentation EnviRonment for DETER , 2007, DETER.

[4]  Raphael C.-W. Phan,et al.  Augmented Attack Tree Modeling of Distributed Denial of Services and Tree Based Attack Detection Method , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[5]  George M. Mohay,et al.  A Distributed Denial of Service Testbed , 2010, HCC.

[6]  Yixian Yang,et al.  A Simulation Platform of DDoS Attack Based on Network Processor , 2008, 2008 International Conference on Computational Intelligence and Security.

[7]  Dongho Kim,et al.  Experience with DETER: a testbed for security research , 2006, 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2006. TRIDENTCOM 2006..

[8]  Chung-Hsin Liu,et al.  The Simulation for the VoIP DDoS Attack , 2008, 2008 International Conference on MultiMedia and Information Technology.

[9]  Mike Hibler,et al.  An integrated experimental environment for distributed systems and networks , 2002, OPSR.

[10]  Charles V. Wright,et al.  Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security , 2010, RAID.

[11]  S. Selvakumar,et al.  Distributed Denial-of-Service (DDoS) Threat in Collaborative Environment - A Survey on DDoS Attack Tools and Traceback Mechanisms , 2009, 2009 IEEE International Advance Computing Conference.

[12]  Kuldip Singh,et al.  Performance Analysis of Web Service under DDoS Attacks , 2009, 2009 IEEE International Advance Computing Conference.

[13]  Sonia Fahmy,et al.  Automating DDoS Experimentation , 2007, DETER.

[14]  Raphael C.-W. Phan,et al.  DDoS attacks traffic and Flash Crowds traffic simulation with a hardware test center platform , 2011, 2011 World Congress on Internet Security (WorldCIS-2011).

[15]  Kotagiri Ramamohanarao,et al.  Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.

[16]  Ness B. Shroff,et al.  Emulation versus simulation: a case study of TCP-targeted denial of service attacks , 2006, 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2006. TRIDENTCOM 2006..