Automating DDoS experimentation

  • Authors:
  • Jelena Mirkovic;Brett Wilson;Alefiya Hussain;Sonia Fahmy;Peter Reiher;Roshan Thomas;Stephen Schwab

  • Affiliations:
  • University of Delaware, Newark, DE;SPARTA, Inc., El Segundo, CA;SPARTA, Inc., El Segundo, CA;Purdue University, West Lafayette, IN;UCLA, Los Angeles, CA;SPARTA, Inc., Centreville, VA;SPARTA, Inc., El Segundo, CA

  • Venue:
  • DETER Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test 2007
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

While the DETER testbed provides a safe environment and basic tools for security experimentation, researchers face a significant challenge in assembling the testbed pieces and tools into realistic and complete experimental scenarios. In this paper, we describe our work on automating experimentation for distributed denial-of-service attacks. We developed the following automation tools: (1) the Experimenter's Workbench that provides a graphical user interface, tools for topology, traffic and monitoring setup and tools for statistics collection, visualization and processing, (2) a DDoS benchmark suite that contains a set of diverse and comprehensive attack scenarios, (3) the Experiment Generator that combines chosen AS-level and edge-level topologies, legitimate traffic and a set of attacks into DETER-compatible scripts. Jointly, these tools facilitate easy experimentation even for novice users.