A framework for generating realistic traffic for distributed denial-of-service attacks and flash events


Autoria(s): Bhatia, Sajal; Schmidt, Desmond; Mohay, George; Tickle, Alan
Data(s)

01/02/2014

Resumo

An intrinsic challenge associated with evaluating proposed techniques for detecting Distributed Denial-of-Service (DDoS) attacks and distinguishing them from Flash Events (FEs) is the extreme scarcity of publicly available real-word traffic traces. Those available are either heavily anonymised or too old to accurately reflect the current trends in DDoS attacks and FEs. This paper proposes a traffic generation and testbed framework for synthetically generating different types of realistic DDoS attacks, FEs and other benign traffic traces, and monitoring their effects on the target. Using only modest hardware resources, the proposed framework, consisting of a customised software traffic generator, ‘Botloader’, is capable of generating a configurable mix of two-way traffic, for emulating either large-scale DDoS attacks, FEs or benign traffic traces that are experimentally reproducible. Botloader uses IP-aliasing, a well-known technique available on most computing platforms, to create thousands of interactive UDP/TCP endpoints on a single computer, each bound to a unique IP-address, to emulate large numbers of simultaneous attackers or benign clients.

Identificador

http://eprints.qut.edu.au/88692/

Publicador

Elsevier

Relação

DOI:10.1016/j.cose.2013.11.005

Bhatia, Sajal, Schmidt, Desmond, Mohay, George, & Tickle, Alan (2014) A framework for generating realistic traffic for distributed denial-of-service attacks and flash events. Computers and Security, 40, pp. 95-107.

Fonte

School of Electrical Engineering & Computer Science; Science & Engineering Faculty

Palavras-Chave #Synthetic traffic generation; DDoS attacks; Flash Events; IP-aliasing; Testbed framework
Tipo

Journal Article