A framework for generating realistic traffic for Distributed Denial-of-Service attacks and Flash Events

被引:36
作者
Bhatia, Sajal [1 ]
Schmidt, Desmond [1 ]
Mohay, George [1 ]
Tickle, Alan [1 ]
机构
[1] Queensland Univ Technol, Fac Sci & Engn, Informat Secur Discipline, Brisbane, Qld 4001, Australia
关键词
Synthetic traffic generation; DDoS attacks; Flash Events; IP-aliasing; Testbed framework;
D O I
10.1016/j.cose.2013.11.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An intrinsic challenge associated with evaluating proposed techniques for detecting Distributed Denial-of-Service (DDoS) attacks and distinguishing them from Flash Events (FEs) is the extreme scarcity of publicly available real-word traffic traces. Those available are either heavily anonymised or too old to accurately reflect the current trends in DDoS attacks and FEs. This paper proposes a traffic generation and testbed framework for synthetically generating different types of realistic DDoS attacks, FEs and other benign traffic traces, and monitoring their effects on the target. Using only modest hardware resources, the proposed framework, consisting of a customised software traffic generator, 'Botloader', is capable of generating a configurable mix of two-way traffic, for emulating either large-scale DDoS attacks, FEs or benign traffic traces that are experimentally reproducible. Botloader uses IP-aliasing, a well-known technique available on most computing platforms, to create thousands of interactive UDP/TCP endpoints on a single computer, each bound to a unique IP-address, to emulate large numbers of simultaneous attackers or benign clients. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:95 / 107
页数:13
相关论文
共 28 条
[1]  
Ahmed E., 2010, P 25 INT INF SEC C S
[2]  
[Anonymous], 2009, P 2009 IEEE S COMP I
[3]  
Arlitt M., 1998, World Cup Web Site Access Logs
[4]   Current Developments in DETER Cybersecurity Testbed Technology [J].
Benzel, Terry ;
Braden, Bob ;
Faber, Ted ;
Mirkovic, Jelena ;
Schwab, Steve ;
Sollins, Karen ;
Wroclawski, John .
CATCH 2009: CYBERSECURITY APPLICATIONS AND TECHNOLOGY CONFERENCE FOR HOMELAND SECURITY, PROCEEDINGS, 2009, :57-70
[5]  
BHATIA S, 2012, NETW COMP APPL NCA 2, P79
[6]   Analyzing interaction between distributed denial of service attacks and mitigation technologies [J].
Blackert, WJ ;
Gregg, DM ;
Castner, AK ;
Kyle, EM ;
Hom, RL ;
Jokerst, RM .
DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL I, PROCEEDINGS, 2003, :26-36
[7]   A tool for the generation of realistic network workload for emerging networking scenarios [J].
Botta, Alessio ;
Dainotti, Alberto ;
Pescape, Antonio .
COMPUTER NETWORKS, 2012, 56 (15) :3531-3547
[8]  
Buchanan W. J., 2011, METHODOLOGY EVALUATE
[9]  
Calvet J., 2010, P VIR B C SEPT 2010, P241
[10]  
Hettich S., 1999, The UCI KDD Archive