Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise

  • Authors:
  • Jelena Mirkovic;Peter Reiher;Christos Papadopoulos;Alefiya Hussain;Marla Shepard;Michael Berg;Robert Jung

  • Affiliations:
  • USC Information Sciences Institute, Marina Del Rey;UCLA, Los Angeles;Colorado State University, Fort Collins;SPARTA, Inc., El Segundo;BBN Technologies, Cambridge;Sandia National Laboratories, Albuquerque;Sandia National Laboratories, Albuquerque

  • Venue:
  • IEEE Transactions on Computers
  • Year:
  • 2008

Quantified Score

Hi-index 14.98

Visualization

Abstract

Testing security systems is challenging because a system's authors have to play the double role of attackers and defenders. Red Team/Blue Team exercises are an invaluable mechanism for security testing. They partition researchers into two competing teams of attackers and defenders, enabling them to create challenging and realistic test scenarios. While such exercises provide valuable insight into vulnerabilities of security systems, they are very expensive and thus rarely performed. In this paper we describe a Red Team/Blue Team exercise, sponsored by DARPA's FTN program, and performed October 2002 --- May 2003. The goal of the exercise was to evaluate a collaborative DDoS defense, comprised of a distributed system, COSSACK, and a stand-alone defense, D-WARD. The role of the Blue Team was played by developers of the tested systems from USC/ISI and UCLA, the Red Team included researchers from Sandia National Laboratory, and all the coordination, experiment execution, result collection and analysis was performed by the White Team from BBN Technologies. This exercise was of immense value to all involved --- it uncovered significant vulnerabilities in tested systems, pointed out desirable characteristics in DDoS defense systems (e.g., avoiding reliance on timing mechanisms), and taught us many lessons about testing of DDoS defenses.