Changes between Version 25 and Version 26 of GEC13Agenda/EveningDemoSession


Ignore:
Timestamp:
03/14/12 14:21:57 (12 years ago)
Author:
kccamer@clemson.edu
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • GEC13Agenda/EveningDemoSession

    v25 v26  
    177177 Demo participants: Katherine Cameron, Ilker Ozcelik, Richard Brooks
    178178 Affiliation: Clemson University
    179  In today’s world the Internet is an environment where people not only communicate but also share knowledge, do business, attend school, and even socialize. As a result of growing dependence on the Internet, one of the biggest concerns of Internet users is security. Unfortunately, the number of security incidents increases exponentially every year. A Distributed Denial-of-Service attack (DDoS attack) disables network services to legitimate users by flooding them. The recent attacks on trusted financial websites, Mastercard and !PayPal, are an example of the need for security against DDoS attacks. One of the major problems with Distributed Denial of Service attacks is how difficult it is to detect the source of the attack, because of the many components involved. In this study, we will obtain the Internet traffic signature to use as background traffic in future experiments. By using the real background traffic we will investigate the effectiveness of theoretical DDoS Attack detection techniques on GENI.
     179 In today’s world the Internet is an environment where people not only communicate but also share knowledge, do business, attend school, and even socialize. As a result of growing dependence on the Internet, one of the biggest concerns of Internet users is security. Unfortunately, the number of security incidents increases exponentially every year. A Distributed Denial-of-Service attack (DDoS attack) disables network services to legitimate users by flooding them. The recent attacks on trusted financial websites, Mastercard and !PayPal, are an example of the need for security against DDoS attacks. One of the major problems with Distributed Denial of Service attacks is how difficult it is to detect the source of the attack, because of the many components involved. There are two studies of DDoS attacks that we are currently investigating and have presented in the demo session of GEC13. In the first study, we obtain the Internet traffic signature to use as background traffic in future experiments. By using real background traffic we will investigate the effectiveness of theoretical DDoS Attack detection techniques on GENI. In the second study we are investigating how one can manipulate system parameters of the Bandwidth Contention Resolution process of WiMAX to adversely affect user throughput and packet-loss rate and potentially use the parameters to implement a DDoS attack.
    180180
    181181=== Demonstration of robust delivery services and multi-homing in !MobilityFirst FIA ===