A Novel Approach to Simulate DDoS Attack

Full Text (PDF, 618KB), PP.33-40

Views: 0 Downloads: 0

Author(s)

Qing. Li 1,* LeJun CHI 1 ZhaoXin ZHANG 1

1. Harbin Institute of Technology at WeiHai, WeiHai, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2011.02.05

Received: 4 Jan. 2011 / Revised: 8 Feb. 2011 / Accepted: 9 Mar. 2011 / Published: 15 Apr. 2011

Index Terms

Distributed denial of service attack, simualtion, packet forwarding

Abstract

Due to the rapid spread of botnets, distributed denial of service attacks have become more and more frequent and fatal. In order to detect and defend DDoS attack, many researches have been done, such as using NS2 to simulate such attacks. However, the major bottlenecks in large-scale network simulation are the memory usage and simulation time. In this paper, we present a novel approach to simulate DDoS attack, called Analytical Packet Forwarding Model (APFM), which simplifies the procedure of packet forwarding based on computation. The experimental results show that our model ensures the authenticity of the overall simulation procedure and simulation results, compared to NS2. The most significant contribution of APFM is that it significantly reduced the memory usage and simulation time.

Cite This Paper

Qing LI,LeJun CHI,ZhaoXin ZHANG,"A Novel Approach to Simulate DDoS Attack", IJWMT, vol.1, no.2, pp.33-40, 2011. DOI: 10.5815/ijwmt.2011.02.05 

Reference

[1] I. Kotenko, A. Ulanov, "The Software Environment for Multi-agent Simulation of Defense Mechanisms against DDoS Attacks", Proceedings of CIMCA 2005 and International Conference on Intelligent Agents, Web Technologies and Internet, 2005, pp. 283-288.

[2] M. Q. Zhang, J. Xie, M. Zhang, X. L. Zhang, "Modeling and simulation of DDos attacks using OPNET modeler", Xitong Fangzhen Xuebao / Journal of System Simulation, v 20, n 10, May 20, 2008, p 2736-2739 Language: Chinese.

[3] H. W. Lee, T.Y. Kwon, H. J. Kim, "NS-2 based IP traceback simulation against reflector based DDoS attack", Proceedings of Artificial Intelligence and Simulation. 2005, pp. 90-99

[4] S. Floyd, V. Paxton. Difficulties in Simulating the Internet. IEEE/ACM Transactions on Networking (TON). 2001,94):392-403

[5] G. F. Riley, M. H. Ammar. Simulating Large Networks How Big is Big Enough?[C]. In Proceedings of the First International Conference on Grand Challenges for Modeling and Simulation, San Antonio, TX, 2002:28-31.

[6] S. Bajaj, L. Breslau, D. Estrin, et al. Improving simulation for network research. Technical Report 99-702b, USC Computer Science Department, 1999

[7] The Network Simulator ns-2: ns by Example; http://nile.wpi.edu/NS/.