Changes between Version 26 and Version 27 of GEC13Agenda/EveningDemoSession


Ignore:
Timestamp:
03/14/12 14:25:53 (13 years ago)
Author:
kccamer@clemson.edu
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • GEC13Agenda/EveningDemoSession

    v26 v27  
    175175=== Clemson Wimax Demo  ===
    176176
    177  Demo participants: Katherine Cameron, Ilker Ozcelik, Richard Brooks
    178  Affiliation: Clemson University
     177 Demo participants: Katherine Cameron, Ilker Ozcelik, Richard Brooks[[BR]]
     178 Affiliation: Clemson University [[BR]]
    179179 In today’s world the Internet is an environment where people not only communicate but also share knowledge, do business, attend school, and even socialize. As a result of growing dependence on the Internet, one of the biggest concerns of Internet users is security. Unfortunately, the number of security incidents increases exponentially every year. A Distributed Denial-of-Service attack (DDoS attack) disables network services to legitimate users by flooding them. The recent attacks on trusted financial websites, Mastercard and !PayPal, are an example of the need for security against DDoS attacks. One of the major problems with Distributed Denial of Service attacks is how difficult it is to detect the source of the attack, because of the many components involved. There are two studies of DDoS attacks that we are currently investigating and have presented in the demo session of GEC13. In the first study, we obtain the Internet traffic signature to use as background traffic in future experiments. By using real background traffic we will investigate the effectiveness of theoretical DDoS Attack detection techniques on GENI. In the second study we are investigating how one can manipulate system parameters of the Bandwidth Contention Resolution process of WiMAX to adversely affect user throughput and packet-loss rate and potentially use the parameters to implement a DDoS attack.
    180180