Packet Simulation of Distributed Denial of Service (DDoS) Attack and Recovery
dc.contributor.advisor | Dean, Richard A. | en_US |
dc.contributor.author | Khanal, Sandarva | |
dc.contributor.author | Lynton, Ciara | |
dc.date.accessioned | 2015-10-09T18:00:26Z | en |
dc.date.available | 2015-10-09T18:00:26Z | en |
dc.date.issued | 2013-10 | en |
dc.identifier.issn | 0884-5123 | en |
dc.identifier.issn | 0074-9079 | en |
dc.identifier.uri | http://hdl.handle.net/10150/579511 | en |
dc.description | ITC/USA 2013 Conference Proceedings / The Forty-Ninth Annual International Telemetering Conference and Technical Exhibition / October 21-24, 2013 / Bally's Hotel & Convention Center, Las Vegas, NV | en_US |
dc.description.abstract | Distributed Denial of Service (DDoS) attacks have been gaining popularity in recent years. Most research developed to defend against DDoS attacks have focused on analytical studies. However, because of the inherent nature of a DDoS attack and the scale of a network involved in the attack, analytical simulations are not always the best way to study DDoS attacks. Moreover, because DDoS attacks are considered illicit, performing real attacks to study their defense mechanisms is not an alternative. For this reason, using packet/network simulators, such as OPNET Modeler, is the best option for research purposes. Detection of an ongoing DDoS attack, as well as simulation of a defense mechanism against the attack, is beyond the scope of this paper. However, this paper includes design recommendations to simulate an effective defense strategy to mitigate DDoS attacks. Finally, this paper introduces network links failure during simulation in an attempt to demonstrate how the network recovers during and following an attack. | |
dc.description.sponsorship | International Foundation for Telemetering | en |
dc.language.iso | en_US | en |
dc.publisher | International Foundation for Telemetering | en |
dc.relation.url | http://www.telemetry.org/ | en |
dc.rights | Copyright © held by the author; distribution rights International Foundation for Telemetering | en_US |
dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | |
dc.subject | Distributed Denial of Service | en |
dc.subject | Network Simulation | en |
dc.subject | OPNET Modeler | en |
dc.title | Packet Simulation of Distributed Denial of Service (DDoS) Attack and Recovery | en_US |
dc.type | text | en |
dc.type | Proceedings | en |
dc.contributor.department | Morgan State University | en |
dc.identifier.journal | International Telemetering Conference Proceedings | en |
dc.description.collectioninformation | Proceedings from the International Telemetering Conference are made available by the International Foundation for Telemetering and the University of Arizona Libraries. Visit http://www.telemetry.org/index.php/contact-us if you have questions about items in this collection. | en_US |
refterms.dateFOA | 2018-06-27T04:59:42Z | |
html.description.abstract | Distributed Denial of Service (DDoS) attacks have been gaining popularity in recent years. Most research developed to defend against DDoS attacks have focused on analytical studies. However, because of the inherent nature of a DDoS attack and the scale of a network involved in the attack, analytical simulations are not always the best way to study DDoS attacks. Moreover, because DDoS attacks are considered illicit, performing real attacks to study their defense mechanisms is not an alternative. For this reason, using packet/network simulators, such as OPNET Modeler, is the best option for research purposes. Detection of an ongoing DDoS attack, as well as simulation of a defense mechanism against the attack, is beyond the scope of this paper. However, this paper includes design recommendations to simulate an effective defense strategy to mitigate DDoS attacks. Finally, this paper introduces network links failure during simulation in an attempt to demonstrate how the network recovers during and following an attack. |