21
DESIGN AND IMPLEMENTATION OF A DDOS TESTBED SUBMITTED TO: SUBMITTED BY: DR. KRISHAN SALUJA JATIN SINGH

Implementation Of real testbed of DDOS

Embed Size (px)

Citation preview

Page 1: Implementation Of real testbed of DDOS

DESIGN AND IMPLEMENTATION OF A DDOS TESTBED

SUBMITTED TO: SUBMITTED BY: DR. KRISHAN SALUJA JATIN SINGH

Page 2: Implementation Of real testbed of DDOS

Contents1. About Internet Malware2. Introduction to Dos/DDoS3. Architecture of DDoS4. Motivation5. Experimental techniques6. Graph7. Comparison b/w Experimental techniques8. Real time testbed9. Hardware and Software used10.CORE11. Tools used in this project12.Future Scope

Page 3: Implementation Of real testbed of DDOS

Internet Malware

▪ Viruses

▪ Worms

▪ Trojan Horse

▪ DoS

▪ DDoS

▪ Phishing

Page 4: Implementation Of real testbed of DDOS

DEFINING DOS/DDOS

Denial of service attack(DoS) is an intentional attempt by malicious users / attackers to completely disrupt or degrade availability of service / resource to legitimate / authorized users.

Distributed denial of service attack(DDoS) is a well coordinated attack on the availability of services of a given target system or network that is launched indirectly through many compromised computing systems by sending a stream of Useless traffic meant to explode victim / network resources.

Page 5: Implementation Of real testbed of DDOS

DDOS Attack Architecture

Page 6: Implementation Of real testbed of DDOS

MOTIVATION BEHIND THE INCREASING DDOS ATTACKS

Name and Fame amongst attackers communityFinancial ProfitPolitical RevengeEasy and free availability of user friendly attack toolsBusiness Competitors

Page 7: Implementation Of real testbed of DDOS

1.Mathematical models2.Simulation models3.Emulation models4.Real time

Experimental techniques

Page 8: Implementation Of real testbed of DDOS

EXPERIMENTAL TECHNIQUES

Page 9: Implementation Of real testbed of DDOS

Comparison b/w Experimental techniques

▪ Mathematical model

▪ Simulated model ▪ Emulated model

• Models for OS, APPs, Platforms and Conditions

• Models for Key OS , Mechanisms , Algorithms , Kernel Apps

• Virtual Platforms• Synthetic conditions

• Real Apps• Real Platforms• Real OS• Synthetic

Conditions

• Real time model

• Real OS• Real Apps• Real Platforms• Real Conditions

Page 10: Implementation Of real testbed of DDOS

Real time testbed

Page 11: Implementation Of real testbed of DDOS
Page 12: Implementation Of real testbed of DDOS

HARDWARE AND SOFTWARE USED

HARDWARE1. D-LINK 2800 SERIES

ROUTER2. D-LINK L2,L3 SWITCHES3. DESKTOPS INSTALLED WITH

UBUNUTU 14.04

SOFTWARE1. APACHE WEB SERVER2. SNIFFER- WIRESHARK3. EMULATOR- CORE ,NS-34. TOOLS USED- HULK,HTTP

FLOODER, HPING3,CORAL REEF5. OS- UBUNTU 14.04

Page 13: Implementation Of real testbed of DDOS

CORE

Abbreviated as Common Open Research Emulator.The CORE project provides an iso image called VCORE than

can run in Virtual Box.The file used for running is very large almost 600

megabytes. CORE can also be run on a virtual machine on PC or laptop.

Page 14: Implementation Of real testbed of DDOS

Start Screen of CORE

Page 15: Implementation Of real testbed of DDOS

Drag nodes

Page 16: Implementation Of real testbed of DDOS

ASSIGN IPv4 Addresses

Page 17: Implementation Of real testbed of DDOS

Start the topology

Page 18: Implementation Of real testbed of DDOS

lTools and flooder used in topology to generate Trafficooder used in topology to generate traffic

1. HULK

 Unique pattern is generated at each and every request, with the intention of increasing the load on the servers as well as evading any intrusion detection and prevention systems.

Uses User Agent Strings to trick Webserver. Have capability to bypass captcha validation.

2. SLOWRIS

A Slow Loris attack waits for sockets to be released by legitimate requests before consuming them one by one.

 Slow Loris sends subsequent HTTP headers for each request, but never actually completes the request. Ultimately, the targeted server’s maximum concurrent connection pool is filled, and additional (legitimate) connection attempts are denied.

Page 19: Implementation Of real testbed of DDOS

CONTINUED….

3. HTTP FLODDER

Python based tool Generate application layer traffic(HTTP traffic) Uses multiple threading to open multiple connection to target node Capability to spoof IP addresses

4. D-ITG(Distributed Internet Traffic Generator)

Accepted World Wide as legitimate traffic generator Supports generation of VoIP , Game (Counter Strike & Quake 3)traffic. Capable of generating traffic patterns similar to that of flash traffic. Highly customizable can explicitly specify packet size , Inter-Departure Time ….

Page 20: Implementation Of real testbed of DDOS

Future Scope of our Project

Detect and defend of DDOS attack Impact measure(response time ,throughput ,transaction rate) Different type of attack can be launched( ICMP , HTTP, UDP ,

TCP, SYN )

Page 21: Implementation Of real testbed of DDOS

THANK YOU

Any Queries….