DDoS Attack’s Simulation Using Legitimate and Attack Real Data Sets

In this day and age, the internet is the new resource tool for the masses. It has changed the way we live in society and the way people interact with each other. There are about nine hundred million people, who are using internet now a day. They can use the internet to communicate with each other from all over the world, business can do their work over the internet, and students can take online classes and many more. Therefore, the availability of internet is very critical for the socio economic growth of the society. Distributed Denial of Service (DDoS) is one of the major threats for the current Internet because of its ability to create a huge volume of malicious data. As a result of it services of internet are severely degraded. One of the biggest challenges before researchers is to find the details of such attacks because due to damaging reputation issues, most of the commercial sites do not even disclose that they were blitzed by such attacks. In this project work, we have used the real time attack and legitimate traces in order to perform the simulation of DDoS attacks. We have simulated the network topology and attach the real time traces with the topology. The impact of attack is measured in terms of metrics such as throughput and percentage link utilization.

[1]  David Moore,et al.  The CoralReef Software Suite as a Tool for System and Network Administrators , 2001, LISA.

[2]  Monika Sachdeva,et al.  Impact Analysis of Recent DDoS Attacks , 2011 .

[3]  Yonghua You,et al.  A Defense Framework for Flooding-based DDoS Attacks , 2007 .

[4]  C. Douligeris,et al.  DDoS attacks and defense mechanisms: a classification , 2003, Proceedings of the 3rd IEEE International Symposium on Signal Processing and Information Technology (IEEE Cat. No.03EX795).

[5]  Gary C. Kessler,et al.  Defenses Against Distributed Denial of Service Attacks , 2001 .

[6]  Kuldip Singh,et al.  DDoS Incidents and their Impact: A Review , 2010, Int. Arab J. Inf. Technol..

[7]  J. R. Scotti,et al.  Available From , 1973 .

[8]  Zhang Xiao-wei Internet and Network Security , 2011 .

[9]  Los Angeles,et al.  D-WARD: Source-End Defense Against Distributed Denial-of-Service Attacks , 2003 .

[10]  Philippe Owezarski On the impact of DoS attacks on Internet traffic characteristics and QoS , 2005, Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005..

[11]  Gurvinder Singh,et al.  Measuring Impact of DDOS Attacks on , 2009 .

[12]  Stuart Harvey Rubin,et al.  Distributed denial of service attacks , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[13]  Qijun Gu,et al.  Denial of Service Attacks , 2012 .

[14]  Peter Reiher,et al.  A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.

[15]  Kotagiri Ramamohanarao,et al.  Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.

[16]  Kevin J. Houle,et al.  Trends in Denial of Service Attack Technology , 2001 .

[17]  Jan H. P. Eloff,et al.  New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the Ifip Tc 11 22nd International Information Security Conference ... Federation for Information Processing) , 2007 .

[18]  Vrizlynn L. L. Thing,et al.  A Survey of Bots Used for Distributed Denial of Service Attacks , 2007, SEC.