Research Article
DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed
@INPROCEEDINGS{10.1109/TRIDENTCOM.2007.4444680, author={Jelena Mirkovic and Songjie Wei and Alefiya Hussain and Brett Wilson and Roshan Thomas and Stephen Schwab and Sonia Fahmy and Roman Chertov and Peter Reiher}, title={DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed}, proceedings={3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom)}, publisher={IEEE}, proceedings_a={TRIDENTCOM}, year={2008}, month={2}, keywords={}, doi={10.1109/TRIDENTCOM.2007.4444680} }
- Jelena Mirkovic
Songjie Wei
Alefiya Hussain
Brett Wilson
Roshan Thomas
Stephen Schwab
Sonia Fahmy
Roman Chertov
Peter Reiher
Year: 2008
DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed
TRIDENTCOM
IEEE
DOI: 10.1109/TRIDENTCOM.2007.4444680
Abstract
While the DETER testbed provides a safe environment and basic tools for security experimentation, researchers face a significant challenge in assembling the testbed pieces and tools into realistic and complete experimental scenarios. In this paper, we describe our work on developing a set of sampled and comprehensive benchmark scenarios, and a workbench for experiments involving denial-of-service (DoS) attacks. The benchmark scenarios are developed by sampling features of attacks, legitimate traffic and topologies from the real Internet. We have also developed a measure of DoS impact on network services to evaluate the severity of an attack and the effectiveness of a proposed defense. The benchmarks are integrated with the testbed via the experimenter’s workbench — a collection of traffic generation tools, topology and defense library, experiment control scripts and a graphical user interface. Benchmark scenarios provide inputs to the workbench, bypassing the user’s selection of topology and traffic settings, and leaving her only with the task of selecting a defense, its configuration and deployment points. Jointly, the benchmarks and the experimenter’s workbench provide an easy, point-and-click environment for DoS experimentation and defense testing.