is sufficient to avoid an invader from forging its own
time by pretending to be older in order to substitute
a missing parent. Since the malware in a real system
could take hours or even days to spread, the invader
has to wait for a time of the same order of magnitude
to ascend a substantial level in the hierarchy. Mean-
while, the other branches of the tree grow indepen-
dently of what the security system is doing in the spy
branch. This is more than enough for the botnet to
make substantial damage to the server.
It is important to notice that, in our botnet con-
figuration, each node is only able to get information
about its adjacent nodes: child, parent, and some
close nodes (siblings and grandparent) due to the elec-
tion procedure. This prevents a possible attacker to
have easy access to the control server and allows a
semi-automatic Degree of Automation.
Another approach to avoid the vulnerability of
having a centralized server taken down is to change
the hierarchy to peer-to-peer, in which each node
would be exposed only to its adjacent bots and ev-
ery node can be a command center. However, this
would forbid the manual control by the Server: time,
rate and the dynamic. Thus, the implemented topol-
ogy is similar to a P2P in the way nodes join the bot-
net and communicate with neighbors, but it is similar
to a hierarchical network in the way command flows
throughout the level of the topology.
6 CONCLUSION
The simulation of DDoS mechanisms implemented in
this work achieved interesting results preserving the
functionality of a real DDoS and clarifying the dis-
semination of information within a botnet along with
its interacting behavior.
The list-based implementation exposed the differ-
ences in each ARD mechanism, since it generated
many levels of hierarchy in the topology using a rel-
atively small number of nodes. Thus, phenomena as
the network propagation delay can be noticed easier:
the time to mobilize all bots in the network is more
expressive and the two mechanisms of attack gener-
ate very different results.
In terms of package loss in the targeted system,
both mechanisms (Continuous and Pulsating) gener-
ated similar outputs. This is expected for a limited
target infrastructure and it can be interpreted as the
botnet having more network bandwidth capacity than
the target.
We also proposed a new election strategy to man-
age the dynamic structure of the botnet network, when
zombie nodes detect failed parents, improving the se-
curity against mitigation from security systems. The
proposed method theoretically meets the objective of
preventing the botnet mitigation by outside invaders.
However, since the simulation of a real scenario of se-
curity system attacking botnets is not trivial, we pre-
ferred to explore such simulations in future projects.
As DDoS from the attacker perspective is not a
common topic in the academia, we expect that this
work can be used as material to new computer net-
work and distributed system courses in order to im-
prove the security discussions.
REFERENCES
Antonakakis, M., April, T., Bailey, M., Bernhard, M.,
Bursztein, E., Cochran, J., Durumeric, Z., Halderman,
J. A., Invernizzi, L., Kallitsis, M., Kumar, D., Lever,
C., Ma, Z., Mason, J., Menscher, D., Seaman, C., Sul-
livan, N., Thomas, K., and Zhou, Y. (2017). Under-
standing the mirai botnet. In 26th USENIX Security
Symposium, pages 1093–1110, Vancouver, BC.
Bhardwaj, A., Subrahmanyam, G. V. B., Avasthi, V., Sastry,
H., and Goundar, S. (2016). DDoS attacks, new DDoS
taxonomy and mitigation solutions - A survey. In 2016
Inter. Conf. on Signal Proc., Commun., Power and
Embedded System (SCOPES), pages 793–798. IEEE.
Columbus, L. (2018). 2018 Roundup of internet of things
forecasts and market estimates. Forbes.
Kolias, C., Kambourakis, G., Stavrou, A., and Voas, J.
(2017). DDoS in the IoT: Mirai and other botnets.
Computer, 50(7):80–84.
Liu, X., Cheng, G., Li, Q., and Zhang, M. (2012). A
comparative study on flood DoS and low-rate DoS at-
tacks. The Journal of China Universities of Posts and
Telecommunications, 19:116–121.
McCallie, D., Butts, J., and Mills, R. (2011). Security anal-
ysis of the ADS-B implementation in the next genera-
tion air transportation system. International l Journal
of Critical Infrastructure Protection, 4(2):78–87.
Mirkovic, J. and Reiher, P. (2004). A taxonomy of ddos at-
tack and ddos defense mechanisms. SIGCOMM Com-
put. Commun. Rev., 34(2):39–53.
Rose, K., Eldridge, S., and Chapin, L. (2015). The internet
of things: An overview. The Internet Society (ISOC),
pages 1–50.
Schatz, D., Bashroush, R., and Wall, J. (2017). Towards a
more representative definition of cyber security. Jour-
nal of Digital Forensics, Security and Law, 12(2):8.
Soltanian, M. R. K. and Amiri, I. S. (2016). Theoretical and
Experimental Methods for Defending Against DDoS
Attacks. Syngress, first edition.
Exploring DDoS Mechanisms
467