Research Article
Emulation versus simulation: a case study of TCP-targeted denial of service attacks
@INPROCEEDINGS{10.1109/TRIDNT.2006.1649164, author={Roman Chertov and Sonia Fahmy and Ness B. Shroff}, title={Emulation versus simulation: a case study of TCP-targeted denial of service attacks}, proceedings={2nd International IEEE/Create-Net Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities}, publisher={IEEE}, proceedings_a={TRIDENTCOM}, year={2006}, month={7}, keywords={}, doi={10.1109/TRIDNT.2006.1649164} }
- Roman Chertov
Sonia Fahmy
Ness B. Shroff
Year: 2006
Emulation versus simulation: a case study of TCP-targeted denial of service attacks
TRIDENTCOM
IEEE
DOI: 10.1109/TRIDNT.2006.1649164
Abstract
In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targeted DoS attacks. We design constructs and tools for emulation testbeds to achieve a level of control comparable to simulation tools. Through a careful sensitivity analysis, we expose difficulties in obtaining meaningful measurements from the DETER and Emulab testbeds with default system settings, and find dramatic differences between simulation and emulation results for DoS experiments. Our results also reveal that software routers such as Click provide a flexible experimental platform, but require understanding and manipulation of the underlying network device drivers. We compare simulation and testbed results to a simple analytical model for predicting the average size of the congestion window of a TCP flow under a low-rate TCP-targeted attack, as a function of the DoS attack frequency. We find that the analytical model and ns-2 simulations closely match in typical scenarios. Our results also illustrate that TCP-targeted attacks can be effective even when the attack frequency is not tuned to the retransmission timeout. The router type, router buffer size, attack pulse length, attack packet size, and attacker location have a significant impact on the effectiveness and stealthiness of the attack.