Figure 9 shows how the proposed defense strategy,
by exploiting the cooperation of StopIt and DiffServ,
re-insures the necessary bandwidth to the DNS
server after the time needed to detect the anomalous
behavior and to dispatch the StopIt requests.
Figure 9: Indirect DDoS Attack (Stopit + Diffserv).
6 EXPECTED OUTCOME
As a result of the research we aim to define the
appropriate simulation models for the prototyping
and validation of software tools for the prevention,
detection, defense and response to attacks on the
security of computer systems. In particular, we will
experiment with the definition of software models
for computer security specified mediating formal
languages, derived from finite state automata at a
level of abstraction that allows formal verification,
for example by means of model-checking
techniques, properties expected from such systems.
An attempt will also use the same models in the
context of existing tools for simulation of network
systems (such as ns-3, NeSSi2) in order to validate
and predict the behavior in more realistic operational
scenarios.
As future work we plan to extend our research by
designing suitable detection algorithms that may
directly run on edge network devices and exploit
StopIt features to block illegal sources also in the
case of indirect attacks. (Furfaro et al. 2014).
REFERENCES
Carneiro, G., H. Fontes, M. Ricardo. 2011. Fast
prototyping of network protocols through ns-3
simulation model reuse. Simulation Modelling
Practice and Theory 19 (9): 2063 – 2075.
Duarte, José. 2012. Identificación de Ataques Informáticos
a través de Redes Bayesianas. Editorial académica
española. ISBN:978-3-659-00652-4
Furfaro, A., Pace, P., Parise, A., Molina, L. 2014, July.
Modelling and Simulation of a defense strategy to face
indirect DDoS flooding attacks. 7
th
International
Conference on Internet and Distributed Computing
Systems.
Grunewald, D., Lützenberger, M., Chinnow, J., Bye, R.,
Bsufka, K., Albayrak, S.2011. Agent-based Network
Security Simulation (Demonstration). DAI-Labor |
TU Berlin | Ernst-Reuter-Platz 7 | 10587 Berlin,
Germany.
Hirsch B., Konnerth, T., Heßler A. 2009. Merging agents
and services — the JIAC agent platform. In Multi-Agent
Programming: Languages, Tools and Applications,
pages 159–185. Springer.
Kumar, P., S. Selvakumar. 2009, March. Distributed
Denial-of-Service (DDoS) Threat in Collaborative
Environment - A Survey on DDoS Attack Tools and
Traceback Mechanisms. In Advance Computing
Conference, 2009. IACC 2009. IEEE International,
1275–1280.
Liu, Xin., Yang, Xiaowei, Lu Yanbin. 2008. To Filter or
to Authorize: Network-Layer DoS Defense against
Multimillion-node Botnets. ACM SIGCOMM’08,
Seattle, Washington, USA.
Ns-3 Manual. 2014. Release ns-3.20. http://www.nsnam.
org/docs/release/3.20/manual/ns-3-manual.pdf.
Neinbe, J. 2010. Log Analyzer for Network Forensics and
Incident Reporting. International Conference on
Intelligent System, Modeling and Simulation. IEEE
Computer Society 978-0-7695-3973-7/10, p356-361.
Patrikakis, C., Masikos, M., Zouraraki O. 2004.
Distributed Denial of Service Attacks. The Internal
Protocol Journal. Volume 7, Number 4, p13-35..
Peng, T., C. Leckie, K. Ramamohanarao. 2007, April.
Survey of Network-based Defense Mechanisms
Countering the DoS and DDoS Problems. ACM
Comput. Surv. 39 (1).
Ramroop S. 2011. A DiffServ model for the NS-3
simulator. http://www.eng.uwi.tt/depts/elec/staff/
rvadams/sramroop/index.htm.
Schmidt, Stephan., Bye, Rainer., Chinnow, Joël. 2008.
Application-level simulation for network security.
DAI-Labor, Berlin Institute of Technology.
Yu, S., Zhou W. 2010. Entropy-Based Collaborative
Detection of DDOS Attacks on Community Networks.
Sixth Annual IEEE International Conference on
Pervasive Computing and Communications.
Zargar, S. T., J. Joshi, D. Tipper. 2013. A Survey of
Defense Mechanisms Against Distributed Denial of
Service (DDoS) Flooding Attacks. IEEE
Communications Surveys & Tutorials 15 (4): 2046–
2069.
DNS
VoIP
HTTPtotal traffic
DDoS
SimulationModelsfortheEvaluationofDetectionandDefenseProtocolsagainstCyberAttacks-PreparationofDoctoral
ConsortiumContributions
47