Opened 8 years ago

Closed 8 years ago

#875 closed (fixed)

Clemson Wimax and DDoS Detection Demo request

Reported by: kccamer@clemson.edu Owned by: agosain@bbn.com
Priority: major Milestone:
Component: WIMAX Version: SPIRAL4
Keywords: GEC13 Cc: iozceli@g.clemson.edu, rrb@clemson.edu
Dependencies:

Description (last modified by Mark Berman)

  1. Brief demo description

Demo participants: Katherine Cameron, Ilker Ozcelik, Richard Brooks Affiliation: Clemson University

WiMAX:

WiMAX is a growing 4G protocol. Through simulations, it has been shown that WiMAX system throughput is sensitive to bandwidth contention parameters. ANOVA analysis of simulated DDoS attacks suggest that two parameters account for over 80% of the variance in system throughput. Using Rutgers University's ORBIT testbeds we are now examining the cross layer affects of these parameters on physical WiMAX systems. This work intends to verify software simulations and to test the fidelity of the ns-2 simulation for wireless systems. We will demonstrate our work to date in replicating these results with hardware-in-the-loop and provide analysis of the indoor and outdoor WiMAX networks that are part of ORBIT and used for our experiments. We will use a poster, slide presentation, and video demonstration to explore our research and how hardware experiments are conducted.

DDoS Detection:

In today’s world the Internet is an environment where people not only communicate but also share knowledge, do business, attend school, and even socialize. As a result of growing dependence on the Internet, one of the biggest concerns of Internet users is security. Unfortunately, the number of security incidents increases exponentially every year. A Distributed Denial-of-Service attack (DDoS attack) disables network services to legitimate users by flooding them. The recent attacks on trusted financial websites, Mastercard and PayPal, are an example of the need for security against DDoS attacks. One of the major problems with Distributed Denial of Service attacks is how difficult it is to detect the source of the attack, because of the many components involved. In this study, we will obtain the Internet traffic signature to use as background traffic in future experiments. By using the real background traffic we will investigate the effectiveness of theoretical DDoS Attack detection techniques on GENI.

  1. List of equipment that will need AC connections (e.g. laptop, switch hardware prototype, monitor). (Just put in the number of connections needed if your demo description already lists the equipment)

Laptop, Monitor (one extra AC connection would be preferable)

  1. Number of wired network connections (include required bandwidth if significant)

One

  1. Number of wireless network connections (include required bandwidth if significant)

Two

  1. Number of static addresses needed (if any)

One

  1. Projector (y/n) (Bring your own projectors if feasible)

No

  1. Monitor (y/n, specify VGA or DVI) (Specify resolution only if your software has resolution restrictions.)

Yes

  1. Number of posters (max size poster boards are 30" x 40")

Two

  1. Description of any special requests (include any non-commercial network connectivity needs, projects you'd like to be located near, etc.)

Combined demo: Katherine Cameron, Ilker Ozcelik of Richard Brooks' lab.

Change History (8)

comment:1 Changed 8 years ago by agosain@bbn.com

Owner: changed from somebody to agosain@bbn.com
Status: newassigned
Summary: Plan for GEC13 demosClemson Wimax Demo request

comment:2 Changed 8 years ago by agosain@bbn.com

Thank you for your demo request. We will update this ticket when the resources have been confirmed.

comment:3 Changed 8 years ago by kccamer@clemson.edu

Component: GPOWIMAX

comment:4 Changed 8 years ago by Mark Berman

Cc: iozceli@g.clemson.edu rrb@clemson.edu added
Description: modified (diff)
Summary: Clemson Wimax Demo requestClemson Wimax and DDoS Detection Demo request

comment:5 Changed 8 years ago by Mark Berman

Description: modified (diff)

comment:6 Changed 8 years ago by agosain@bbn.com

(If you need to respond to something in this message, please update the ticket on the wiki, or send mail to agosain@bbn.com and I can update it for you. Replies to trac@geni.net will return an auto-response.)

We can now confirm that the resources you requested will be available for your demo on Wednesday evening.

comment:7 Changed 8 years ago by agosain@bbn.com

ERRATA

We can now confirm that the resources you requested will be available for your demo on 3/13 Tuesday evening.

comment:8 Changed 8 years ago by agosain@bbn.com

Resolution: fixed
Status: assignedclosed

Thanks again for participating in the GEC 13 evening demo session.

We've added information about the demo session to http://groups.geni.net/geni/wiki/GEC13Agenda/EveningDemoSession. Please feel free to edit the section about your demo, add any participants who you'd like to credit, add links to other relevant pages, and attach any materials (slides, PDFs of posters, etc) about your demo.

If you have any questions or concerns, or need a hand with any of that, just drop a note to help@geni.net.

Note: See TracTickets for help on using tickets.