About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom)

Research Article

DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/TRIDENTCOM.2007.4444680,
        author={Jelena Mirkovic and Songjie Wei and Alefiya Hussain and Brett Wilson and Roshan Thomas and Stephen Schwab and Sonia Fahmy and Roman Chertov and Peter Reiher},
        title={DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed},
        proceedings={3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom)},
        publisher={IEEE},
        proceedings_a={TRIDENTCOM},
        year={2008},
        month={2},
        keywords={},
        doi={10.1109/TRIDENTCOM.2007.4444680}
    }
    
  • Jelena Mirkovic
    Songjie Wei
    Alefiya Hussain
    Brett Wilson
    Roshan Thomas
    Stephen Schwab
    Sonia Fahmy
    Roman Chertov
    Peter Reiher
    Year: 2008
    DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed
    TRIDENTCOM
    IEEE
    DOI: 10.1109/TRIDENTCOM.2007.4444680
Jelena Mirkovic1, Songjie Wei1, Alefiya Hussain2, Brett Wilson2, Roshan Thomas2, Stephen Schwab2, Sonia Fahmy3, Roman Chertov3, Peter Reiher4
  • 1: University of Delaware
  • 2: SPARTA, Inc.
  • 3: Purdue University
  • 4: University of California, Los Angeles

Abstract

While the DETER testbed provides a safe environment and basic tools for security experimentation, researchers face a significant challenge in assembling the testbed pieces and tools into realistic and complete experimental scenarios. In this paper, we describe our work on developing a set of sampled and comprehensive benchmark scenarios, and a workbench for experiments involving denial-of-service (DoS) attacks. The benchmark scenarios are developed by sampling features of attacks, legitimate traffic and topologies from the real Internet. We have also developed a measure of DoS impact on network services to evaluate the severity of an attack and the effectiveness of a proposed defense. The benchmarks are integrated with the testbed via the experimenter’s workbench — a collection of traffic generation tools, topology and defense library, experiment control scripts and a graphical user interface. Benchmark scenarios provide inputs to the workbench, bypassing the user’s selection of topology and traffic settings, and leaving her only with the task of selecting a defense, its configuration and deployment points. Jointly, the benchmarks and the experimenter’s workbench provide an easy, point-and-click environment for DoS experimentation and defense testing.

Published
2008-02-01
Publisher
IEEE
Modified
2010-05-16
http://dx.doi.org/10.1109/TRIDENTCOM.2007.4444680
Copyright © 2007–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL