Arquitetura de um Simulador em Larga em Escala de Ataques Distribuídos de Negação de Serviço
Abstract
Distributed denial of service attacks are characterized by a coordinated action of a huge number of hosts that aims to overload a target system, compromising its availability. These attacks are neither based on software vulnerabilities nor on security architecture flaws. Instead, they are mainly based on the overload caused by an extremely large numbers of attackers. In this way, distributed denial of service attacks are among the hardest attacks to prevent, detect and respond. In the present work, we present a distributed denial of service attacks simulator that is able to reproduce a large variety of attack scenarios, which allows the characterization of networks and hosts resistance against such attacks.
References
Birsan, D., (2005), "On plug-ins and extensible architectures", Queue, v. 3, n. 2, p. 40–46.
Charalampos Z. Patrikakis, M. M., (2004), "Distributed Denial of Service Attacks", Internet Protocol Journal, v. 7, n. 4, p. 13–35.
CNET News, (1998), “Smurf” attack hits Minnesota, http://news.cnet.com/Smurfattack-hits-Minnesota/2100-1001_3-209209.html.
Collberg, C. S., Thomborson, C., (2002), "Watermarking, Tamper-proffing, and Obfuscation: Tools for Software Protection", IEEE Trans. Softw. Eng., v. 28, n. 8 (Aug.), p. 735–746.
Dalla Preda, M., Giacobazzi, R., (2009), "Semantics-based Code Obfuscation by Abstract Interpretation", J. Comput. Secur., v. 17, n. 6 (Dec.), p. 855–908.
Jelena Mirkovic, (2014), DDoS Benchmarks, http://www.isi.edu/~mirkovic/bench.
Leiderman, (2013), Justice for the PayPal WikiLeaks protesters: why DDoS is free speech, http://www.theguardian.com/commentisfree/2013/jan/22/paypalwikileaks-protesters-ddos-free-speech.
Li, D., Hu, Y., Hu, X., Ling, H., (2009), "Self-Checking Tamper-Proofing Based on Software Behavior Model". In: Fourth International Conference on Frontier of Computer Science and Technology, 2009. FCST ’09, p. 639–643
Mirkovic, J., Reiher, P., (2004), "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms", SIGCOMM Comput. Commun. Rev., v. 34, n. 2 (Apr.), p. 39–53.
Paxson, V., (2001), "An Analysis of Using Reflectors for Distributed Denial-of-service Attacks", SIGCOMM Comput. Commun. Rev., v. 31, n. 3 (Jul.), p. 38–47.
Radware, (2013), DDoS Survival Handbook, http://security.radware.com/uploadedFiles/Resources_and_Content/DDoS_Handbook/DDoS_Handbook.pdf.
Stankovic, J., Wood, A., (2004), "A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks", In: Ilyas, M., Mahgoub, I. [eds.] (eds), Handbook of Sensor Networks, CRC Press
Yu, S., Zhou, W., Doss, R., Jia, W., (2011), "Traceback of DDoS Attacks Using Entropy Variations", IEEE Transactions on Parallel and Distributed Systems, v. 22, n. 3 (Mar.), p. 412–425.
