13-11-2012, 03:01 PM
DDoS Attack Simulation Monitoring, and Analysis
DDoS Attack Simulation.pdf (Size: 622.17 KB / Downloads: 54)
DoS–Denial of Service
Characterized by an explicit attempt by attackers to deny legitimate users of a service from using that service”-CERTCoordination Center
General Attack Classification
Bandwidth Attacksare intended to overflow and consume resources available to the victim (i.e., network bandwidth and equipment throughput)
Protocol Attackstake advantage of protocol inherent design (i.e., SMURF and DNS)
Software Vulnerability Attacksattempt to exploit a software program design flaw (i.e., Land attack, Ping of Death, and Fragmentation)
Attack Tool Requirements
Centralized Trigger
Multiple Attack Generator
Academic Research Capability
Project Objectives
Survey different types of DDoS attacks
.Create a tool to simulate several DDoS attacks
.Identify useful metrics and create an analyzer
.Perform experiments
Interpret results