3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom)

Research Article

DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed

  • @INPROCEEDINGS{10.1109/TRIDENTCOM.2007.4444680,
        author={Jelena Mirkovic and Songjie Wei and Alefiya Hussain and Brett Wilson and Roshan Thomas and Stephen Schwab and Sonia Fahmy and Roman Chertov and Peter Reiher},
        title={DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed},
        proceedings={3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom)},
        publisher={IEEE},
        proceedings_a={TRIDENTCOM},
        year={2008},
        month={2},
        keywords={},
        doi={10.1109/TRIDENTCOM.2007.4444680}
    }
    
  • Jelena Mirkovic
    Songjie Wei
    Alefiya Hussain
    Brett Wilson
    Roshan Thomas
    Stephen Schwab
    Sonia Fahmy
    Roman Chertov
    Peter Reiher
    Year: 2008
    DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed
    TRIDENTCOM
    IEEE
    DOI: 10.1109/TRIDENTCOM.2007.4444680
Jelena Mirkovic1, Songjie Wei1, Alefiya Hussain2, Brett Wilson2, Roshan Thomas2, Stephen Schwab2, Sonia Fahmy3, Roman Chertov3, Peter Reiher4
  • 1: University of Delaware
  • 2: SPARTA, Inc.
  • 3: Purdue University
  • 4: University of California, Los Angeles

Abstract

While the DETER testbed provides a safe environment and basic tools for security experimentation, researchers face a significant challenge in assembling the testbed pieces and tools into realistic and complete experimental scenarios. In this paper, we describe our work on developing a set of sampled and comprehensive benchmark scenarios, and a workbench for experiments involving denial-of-service (DoS) attacks. The benchmark scenarios are developed by sampling features of attacks, legitimate traffic and topologies from the real Internet. We have also developed a measure of DoS impact on network services to evaluate the severity of an attack and the effectiveness of a proposed defense. The benchmarks are integrated with the testbed via the experimenter’s workbench — a collection of traffic generation tools, topology and defense library, experiment control scripts and a graphical user interface. Benchmark scenarios provide inputs to the workbench, bypassing the user’s selection of topology and traffic settings, and leaving her only with the task of selecting a defense, its configuration and deployment points. Jointly, the benchmarks and the experimenter’s workbench provide an easy, point-and-click environment for DoS experimentation and defense testing.