Security

Emulation Versus Simulation: A Case Study of TCP-Targeted Denial of Service Attacks

Download Now Free registration required

Executive Summary

This case study speaks about the application of simulation and emulation in the attack experimentation of Denial of Service (DoS). For this purpose, a low-rate TCP-targeted DoS attack has been considered. The authors employed a sensitivity analysis, which exposed the difficulties encountered in finding significant measurements from the Emulab and DETER. Both the test beds had default system settings. Denial of Service attacks cause significant damage to the system and lead to problems such as network partitioning. Such attacks typically target key backbones, inter-domain routing protocols and Domain Name Systems servers. The paper also makes an in-depth study of various attack scenarios. It specifically concentrates on a scenario where short pulses are transmitted at an arbitrary frequency. This type of attack is easy to design and deploy. It also is capable of causing massive damage. The paper proceeds to employ a simple analytical model and uses the attack frequency to predict the average size of the congestion window. The paper also draws comparison between different attacks and system parameters. It also details experiments conducted with Click router. It then analyzes different scenarios and summarizes the findings. The protection against such attacks has also been discussed. This paper studies the application of simulation and emulation in the attack experimentation of DoS. For this purpose, a low-rate TCP-targeted DoS attack has been considered. The authors employed a sensitivity analysis, which exposed the difficulties encountered in finding significant measurements from the Emulab and DETER. Both the test beds had default system settings. Denial of Service attacks cause significant damage to the system and lead to problems such as network partitioning. Such attacks typically target key backbones, inter-domain routing protocols and Domain Name Systems servers. The paper also makes an in-depth study of various attack scenarios. It specifically concentrates on a scenario where short pulses are transmitted at an arbitrary frequency. This type of attack is easy to design and deploy. It also is capable of causing massive damage. The paper proceeds to employ a simple analytical model and uses the attack frequency to predict the average size of the congestion window. The paper also draws comparison between different attacks and system parameters. It also details experiments conducted with Click router. It then analyzes different scenarios and summarizes the findings. The protection against such attacks has also been discussed.

  • Format: PDF
  • Size: 0 KB