tested using real DDoS attack tools including Netbot
Attacker (Han, 2009) and Netkill (Netkill, 2000)
under 8 Gbps of background traffic. Second, the
system was tested using zombie codes that invoked
the 7.7 DDoS attack (Hauri, 2009) in Korea on the
7th of July, 2009.
Table 1 shows the results of test. The test was
performed application level attack as well as
network level attack including UDP and ICMP
flooding attack. In this paper, we only show the test
results of TCP Flooding attack.
Table 1: The test results of DDoS attack.
Attack
Tool
Attack
Menu/Protocol
Result
Netbot
Attacker
[01]SYN Flood TCP SYN Flooding detected.
[05]TCP Flood Not detected.
[06]TCP Multi-
Connect
TCP Connection Flooding
detected.
[11]Route Attack
TCP Connection Flooding
detected.
[12]Smart Auto Attack
TCP Connection Flooding
detected.
[13]SYN+UDP Flood TCP SYN Flooding detected.
[14]ICMP+TCP Flood
TCP Connection Flooding
detected.
[15]UDP+TCP
Connect
TCP Open Flooding detected.
7.7 DDoS
TCP
TCP SYN Flooding detected
(spoofed/non-spoofed)
TCP
TCP Flag (ACK) Flooding
detected (spoofed/non-
spoofed)
Netkill TCP
TCP Fin-Wait-1 Flooding
detected.
5 CONCLUSIONS
TCP Flooding attack can easily overwhelm a server
with big amounts of traffic. Most existing DDoS
prevention techniques perform detection and
response based on the basically simple amount of
traffic or string patterns, so that there are limits on
realizing rapid and accurate prevention in an actual
DDoS attack situation. Our defense mechanism
provide a TCP flooding attack prevention method
which defines several session states based on the
types and direction of a packet, tracks the session
state for each flow, and detects and responds to a
TCP flooding attack. A 20Gbps anti-DDoS system,
we call ‘ALADDIN’ system, was implemented with
our proposed mechanism. The possibility of high-
speed hardware implementation was shown in this
paper. The system was tested using existing DDoS
attack tools in 8Gbps of background traffic. The
system detected TCP flooding attacks during our
test. A test in a real network will be prepared in the
near future.
REFERENCES
L. D. Stein, J. N. Stewart, 2002. The World Wide
WebSecurity FAQ, version 3.1.2, In
<http://www.w3.org/Security/Faq>.
Christos Douligeris, Aikaterini Mitrokotsa, 2004. DDoS
attacks and defense mechanisms; classification and
state-of-the art, In the International Journal of
Computer and Telecommunications Networking,
Vol.44, Issue 5.
Yi Xie and Shun-Zheng Yu, 2009. Monitoring the
Application-Layer DDoS Attacks for Popular
Websites, In IEEE/ACM Transactions on Networking,
Vol.17, No 1.
R. R. Talpade, G. Kim, S. Khurana, 1998. NOMAD:
Trafficbased network monitoring framework for
anomaly detection, In Proceedings of the Fourth IEEE
Symposium on Computers and Communications.
Y. Huang, J. M. Pullen, 2001. Countering Denial of
Service attacks using congestion triggered packet
sampling and filtering, In Proceedings of the 10th
International Conference on Computer
Communiations and Networks.
NFR Security, 2007. NFR Network Intrusion Detection, In
<http://www.nfr.com>.
Snort, 2012, The Open Source Network Intrusion
Detection System, In <http://www.snort.org>.
J. Mirkovic, G. Prier, P. Reiher, 2002. Attacking DDoS at
the source, In Proceedings of ICNP 2002, pp. 312–
321.
F. Kargl, J. Maier, M. Weber, 2001. Protecting web
servers from Distributed Denial of Service attacks, In
Proceedings of the Tenth International Conference on
World Wide Web, pp. 514–524.
A. Garg, A. L. N. Reddy, 2002. Mitigating Denial of
service Attacks using QoS regulation, In Proceedings
of the Tenth IEEE International Workshop on Quality
of Service, pp. 45–53.
Gordon McKinney, 2002. TCP/IP State Transition
Diagram, In RFC793.
Seungyong Yoon, Byoungkoo Kim, Jintae Oh, and
Jongsoo Jang, 2008. H/W based Stateful Packet
Inspection using a Novel Session Architecture, In
International Journal of Computers, Vol.2, Issue 3.
Synplicity, 2012. In <http://www.synplicity.com>
Model, 2012. In <http://www.model.com>
Xilinx, 2012. In <http://www.xilinx.com>
Ixiacom, 2012. In <http://www.ixiacom.com>
K. Han, E. Im, 2009. A Study on the Analysis of Netbot
and Design of Detection Framework, In Proceedings
of JWIS.
Netkill, 2000. Generic remote DoS attack tool, In
<http://www.securiteam.com/tools/5QR0B000AU.html
Hauri, 2009. 7.7 DDos Virus Report. In
<http://www.maxoverpro.org/77DDoS.pdf>
SECRYPT2012-InternationalConferenceonSecurityandCryptography
420