DocumentCode :
3409156
Title :
Benchmarks for DDOS Defense Evaluation
Author :
Mirkovic, Jelena ; Arikan, Erinc ; Wei, Songjie ; Fahmy, Sonia ; Thomas, Roshan ; Reiher, Peter
Author_Institution :
Delaware Univ., Newark, DE
fYear :
2006
fDate :
23-25 Oct. 2006
Firstpage :
1
Lastpage :
10
Abstract :
There is a critical need for a common evaluation methodology for distributed denial-of-service (DDoS) defenses, to enable their independent evaluation and comparison. We describe our work on developing this methodology, which consists of: (i) a benchmark suite defining the elements necessary to recreate DDoS attack scenarios in a testbed setting, (ii) a set of performance metrics that express a defense system´s effectiveness, cost, and security, and (iii) a specification of a testing methodology that provides guidelines on using benchmarks and summarizing and interpreting performance measures. We identify three basic elements of a test scenario: (i) the attack, (ii) the legitimate traffic, and (iii) the network topology including services and resources. The attack dimension defines the attack type and features, while the legitimate traffic dimension defines the mix of the background traffic that interacts with the attack and may experience a denial-of-service effect. The topology/resource dimension describes the limitations of the victim network that the attack targets or interacts with. It captures the physical topology, and the diversity and locations of important network services. We apply two approaches to develop relevant and comprehensive test scenarios for our benchmark suite: (1) we use a set of automated tools to harvest typical attack, legitimate traffic, and topology samples from the Internet, and (2) we study the effect that select features of the attack, legitimate traffic and topology/resources have on the attack impact and the defense effectiveness, and use this knowledge to automatically generate a comprehensive testing strategy for a given defense
Keywords :
Internet; telecommunication network topology; telecommunication security; telecommunication traffic; DDoS defense evaluation; Internet; distributed denial-of-service; legitimate traffic dimension; network topology; Automatic testing; Benchmark testing; Computer crime; Costs; Guidelines; Internet; Measurement; Network topology; System testing; Telecommunication traffic;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Military Communications Conference, 2006. MILCOM 2006. IEEE
Conference_Location :
Washington, DC
Print_ISBN :
1-4244-0617-X
Electronic_ISBN :
1-4244-0618-8
Type :
conf
DOI :
10.1109/MILCOM.2006.302006
Filename :
4086729
Link To Document :
بازگشت