Changes between Version 30 and Version 31 of GEC13Agenda/EveningDemoSession


Ignore:
Timestamp:
03/16/12 17:43:38 (12 years ago)
Author:
iozceli@g.clemson.edu
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • GEC13Agenda/EveningDemoSession

    v30 v31  
    177177 Demo participants: Katherine Cameron, Ilker Ozcelik, Richard Brooks[[BR]]
    178178 Affiliation: Clemson University [[BR]]
    179  In today’s world the Internet is an environment where people not only communicate but also share knowledge, do business, attend school, and even socialize. As a result of growing dependence on the Internet, one of the biggest concerns of Internet users is security. Unfortunately, the number of security incidents increases exponentially every year. A Distributed Denial-of-Service attack (DDoS attack) disables network services to legitimate users by flooding them. The recent attacks on trusted financial websites, Mastercard and !PayPal, are an example of the need for security against DDoS attacks. One of the major problems with Distributed Denial of Service attacks is how difficult it is to detect the source of the attack, because of the many components involved. There are two studies of DDoS attacks that we are currently investigating and have presented in the demo session of GEC13. In the first study, we obtain the Internet traffic signature to use as background traffic in future experiments. By using real background traffic we will investigate the effectiveness of theoretical DDoS Attack detection techniques on GENI. In the second study we are investigating how one can manipulate system parameters of the Bandwidth Contention Resolution process of WiMAX to adversely affect user throughput and packet-loss rate and potentially use the parameters to implement a DDoS attack. Please see WiMAX_DDoS_Clemson.png attachment below for the poster presented on this topic.
     179 In today’s world the Internet is an environment where people not only communicate but also share knowledge, do business, attend school, and even socialize. As a result of growing dependence on the Internet, one of the biggest concerns of Internet users is security. Unfortunately, the number of security incidents increases exponentially every year. A Distributed Denial-of-Service attack (DDoS attack) disables network services to legitimate users by flooding them. The recent attacks on trusted financial websites, Mastercard and !PayPal, are an example of the need for security against DDoS attacks. One of the major problems with Distributed Denial of Service attacks is how difficult it is to detect the source of the attack, because of the many components involved. There are two studies of DDoS attacks that we are currently investigating and have presented in the demo session of GEC13. In the first study, we obtain the Internet traffic signature to use as background traffic in future experiments. By using real background traffic we will investigate the effectiveness of theoretical DDoS Attack detection techniques on GENI. You can access our poster : [http://groups.geni.net/geni/attachment/wiki/GEC13Agenda/EveningDemoSession/GEC13_DDoS_Clemson.pdf Performance Analysis of DDoS Detection Algorithms on Operational Network GEC13 Poster]. In the second study we are investigating how one can manipulate system parameters of the Bandwidth Contention Resolution process of WiMAX to adversely affect user throughput and packet-loss rate and potentially use the parameters to implement a DDoS attack. Please see our [http://groups.geni.net/geni/attachment/wiki/GEC13Agenda/EveningDemoSession/WiMAX_DDoS_Clemson.png WiMAX DDoS] poster presented on this topic.
    180180
    181181=== Demonstration of robust delivery services and multi-homing in !MobilityFirst FIA ===