SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
Impact Analysis of DDoS Attacks on FTP Services
Daljeet Kaur1
and Monika Sachdeva2
1
SBS State Technical Campus/ Deptt. Of Computer Science & Engg., Ferozepur Cantt-152004, Punjab, India
Email: daljeetkaur617@gmail.com
2
SBS State Technical Campus/ Deptt. Of Computer Science & Engg., Ferozepur Cantt-152004, Punjab, India
Email: monika.sal@rediffmail.com
Abstract— Because the ability of Distributed Denial of Service (DDoS) attack creates huge
volume of unwanted traffic so it is widely regarded as a major threat for the current
Internet. A flooding-based DDoS attack is a very common way in which a victim machine is
attacked by sending a large amount of malicious traffic. Because of these attacks,existing
network-level congestion control mechanisms are inadequate for preventing service quality
from deteriorating. Although a number of techniques have been proposed to defeat DDoS
attacks but still It is very hard to detect and respond to DDoS attacks due to large and
complex network environments, the use of source-address spoofing, and moreover its
difficult to make difference between legitimate and attack traffic. To measure the impact of
DDoS attack on FTP services, repeated research in cyber security that is important to the
scientific advancement of the field is required. To fullfill this requirement, the cyber-
DEfense Technology Experimental Research (DETER) testbed has been developed. In this
paper, we have created one dumb-bell topology and generated background traffic as FTP
traffic. We have launched different types of DDoS attacks along with FTP traffic by using
attack tools available in DETER testbed. Finally we have measured impact of DDoS attack
on FTP server in terms of metrics such as throughput, percentage link utilization, and
normal packet survival ratio (NPSR).
Index Terms— Normal Packet Survival Ratio (NPSR), vulnerability, confidentiality, botnet,
DDoS, availability.
I. INTRODUCTION
As DDoS attacks are used to create unwanted traffic for increasing the problems of all Internet Service
Providers (ISPs). This unwanted traffic is “malicious or unproductive traffic that attempts to compromise
vulnerable hosts, propagate malware, spread spam, or deny valuable services”[1]. It degrade the service
quality of networks. Unwanted traffic can be generated due to a flooding-based DDoS (Distributed Denial of
Service) attack. A DDoS attack disturbs normal functionality of the Internet servers by exhausting resources.
For exhausting resources, an attacker can create a huge volume of attack traffic to consume the bandwidth of
the bottleneck link in the victim network.
Confidentiality, authentication, message integrity and non repudiation are desirable security aspects for
secure communication. More people are aware that availability and access control are also urgent
requirements of secure communication because of the notorious Denial of Service (DoS) attacks that render
by the illegitimate users into a network, host, or other piece of network infrastructure to harm them,
especially it is done against the frequently visited websites of a number of high-profile companies or
government websites.
DOI: 02.ITC.2014.5.546
© Association of Computer Electronics and Electrical Engineers, 2014
Proc. of Int. Conf. on Recent Trends in Information, Telecommunication and Computing, ITC
221
An attacker or hacker gradually send attack programs on insecure machines. These compromised machines
are called Handlers or Zombies and are collectively called bots and the attack network is called botnet in
hacker’s community depending upon sophistication in logic of implanted programs. In this, hackers send
control instructions to masters, which then communicate it to zombies for launching attack. As shown in
Figure 1, typical DDoS attack has two stages, the first stage is to compromise susceptible systems that are
accessible in the Internet and then install attack tools in these compromised systems. This is known as turning
the computers into “zombies.” In the second stage, the attacker sends an attack command to the “zombies”
through a secure channel to launch a bandwidth attack against the targeted victim(s).
Figure 1. Attack Modus Operandi
The current attacks on some web sites like Amazon, Yahoo, e-Bay and Microsoft and their resultant
disruption of services have uncovered the weakness of the Internet to Distributed Denial of Service (DDoS)
attacks. It has been observed through reports that TCP is used in more than 85% of the DoS attacks [2]. The
TCP and UDP SYN flooding is the most commonly-used attack. It consists of a stream of spoofed and TCP
and UDP SYN packets directed to a listening ports of the victim. The Web servers are not only but also any
systems connected to the Internet providing UDP and TCP-based network services, such as FTP servers or
Mail servers, are also susceptible to the UDP and TCP SYN flooding attacks.
II. RELATED WORK
To measure the effect of DDoS defense approaches, analyzation of impact of DDoS attack is very important.
As per [3],[4], no benchmarks are available for measuring effectiveness of DDoS defense approaches.
Mostly the existing strategies compare good-put and normal packet survival with and without attack and with
defense [5]. Some of defense approaches [6] have calculated the response time. By measuring normal packets
survival ration proves to be most important because it clearly reflects accuracy of the defense and normal
packet loss [7], [8]. Jelena et al. [9], [10] have used percentage of failed transactions (transactions that do not
follow QoS thresholds) as a metric to measure DDoS impact. They define a threshold-based model for the
relevant traffic measurements, which is application specific. It indicates poor services quality when a
measurement exceeds its threshold. One another metric i.e Server timeout has been also used [11]. Because
legitimate traffic drop i.e. collateral damage is not indicated. Sardana et al. [12] have used good put, mean
time between failure and average response time as performance metrics whereas Gupta et al. [13] have used
two statistical metrics namely, Volume and Flow to detect DDoS attacks. As per [9] metrics such as good-
put, bad-put, response time, number of active connections , ratio of average serve rate and request rate, and
normal packet survival index [8] properly signal denial of service for two way applications such as HTTP,
FTP and DNS, but not for media traffic that is sensitive to one-way delay, packet and jitter.
222
III. RECENT INCIDENTS
It is observed that 2010 should be viewed as the year distributed denial of service (DDoS) attacks became
main stream, says Arbor Networks [14].
TABLE I. RECENT DDOS INCIDENTS ON IMPORTANT WEB SITES [15]
Arbor Networks [14] in its Sixth Annual Worldwide Infrastructure Security Report, released by revealed that
DDoS attack Size has increased to 100 Gbps for first time and it is up by 1000% since 2005. This year has
witnessed a sharp escalation in the scale and frequency of DDoS attack activity on the Internet. DDoS attacks
have been launched against many high profile websites and popular Internet services. In addition to hitting
the 100 Gbps attack barrier for the first time, application layer attacks hit an all-time high. The Table I lists
some of the recent DDoS attacks incidents [14][15].
IV. PERFORMANCE METRICS
Due to seriousness of DDoS problem and growing sophistication of attackers have led to development of
numerous defense mechanisms [16],[17]. But the growing number of DDoS attacks and their financial
implications still needs of a comprehensive solution. Moreover, as we studied that attackers share their attack
codes to fight against these attacks, Internet community needs to devise better ways to accumulate details of
these attacks. Only then a comprehensive solution against DDoS attacks can be devised. Technically, when
DDoS attacks are launched, the various network performance metrics are affected. In current work, our
focus is on measuring these network performance metrics and then comparing them with and without attacks.
As mentioned in Table II, We have measured impact of DDoS attack using following metrics:
Date DDoS target /Incidents Consequences/Description
2012, October Web site of Capital One Bank The incident was the second attack allegedly
waged by a hacktivist group against the bank,
2012, March South Korea and United states Websites
It is similar to those launched in 2009
2012, January
Official Web-site of the office of the
vice president of Russia It caused the site to be down by more than 15
hours.
2011, November Asian Ecommerce Company
Flood of Traffic was launched and 250,000
Computers are infected with malware
participated
2011, November Server
The traffic load has been immense with
several thou-sands request per second.
2011, October
Site of National Election Com-mission
of South Korea
Attacks were launched during the morning
when citizens would look up information and
attack leads to fewer turnouts
2011, March On Blogging Platform Live Journal
Experienced serious functionality problems
for over 12 Hours and resumed on April 4
and 5, 2011
2010, December
Master Card, PayPal, Visa and Post
Finance
Attack was launched in support of
WikiLeaks.ch and its founder. Attack lasts
for more than 16 hours.
2010, November Whistleblower site Wikileaks
Attack size was 10 Gbps. Caused the site
unavailable to visitors. Attack was launched
to prevent release of secret cables.
2010, November whistleblower site Wikileaks
Attack size was 2-4 Gbps. Attack was
launched just after it released confidential US
diplomatic cables.
2010, November Domain registrar Register.com
Impacted DNS, hosting and webmail clients
2010, November Burma’s main Internet provider
Disrupted most network traffic in and out of
the country for 2 days. Geopolitical
motivated attack. Attack size was of 1.09
Gbps (average) & 14.58 Gbps (maximum) .
Attack vectors were TCP Syn/rst 85%,
flooding 15%.
2010, September Fast growing botnet Botnet’s motive was to provide commercial
service
223
TABLE II. METRICS FOR ATTACK’S IMPACT ANALYSIS
 Throughput: Throughput is defined as the rate of sending or receiving of data by a network. It is a good
measure of the channel capacity of a communications link, and connections to the internet are which is
mostly rated in terms of how many bits they pass per second (bit/s). Throughput is measured in terms of
good-put and bad-put respectively. Good-put is defined as no. of bits per second of legitimate traffic that
are received at the server and bad-put is defined as no. of bits per second of attack traffic that are
received at the server.
 Backbone Link Utilization: Backbone Link Utilization is defined as percentage of bandwidth that is
being used for good put (legitimate traffic)
 Normal Packet Survival Ratio: This metric is used to measure impact of attack as we can measure
impact of attack as a percentage of legitimate packets delivered during the attack. If this percentage is
high, then the service continues with little interruption.
V. EVALUATION IN TESTBED EXPERIMENT
We have used DETER testbed to evaluate our metrics in experiments using SEER (Security Experimentation
EnviRonment) GUI BETA6 environment [18][19]. This test bed is located at the USC Information Sciences
Institute and UC Berkeley and security researchers used this testbed to evaluate attacks and defenses in a
controlled environment.
A. Experimental Topology
Figure 2 shows the experimental topology and Figure 3 shows our experimental topology definition for FTP
applications in which R1, R2, R3 and R4 are routers, node S is server and L1-L20 are clients. These clients
are used to send legitimate requests to server S via router R1 and R2. The bandwidth of all links is to be set
100Mbps, and 1.5Mbps is the bandwidth of bottleneck link (R1-R2). In this topology node A1 acts as
attacking node and it sends attack traffic to server S via router R1 and R2. The link between R1 and R2 is
called bottleneck link.
Figure 2. Experimental Topology
Metric
Description
Throughput (α)
Vα= (ьl + ьa)/Δ, ьl , ьa and Δ
represents no. of legitimate bytes, no. of
attack bytes and time window for
analysis respectively.
Percentage Link
Utilization (£) £ represents percentage of bandwidth
that is being used for good put.
Normal Packet
Survival Ratio
(η)
η = pl /( pl + pa ), pl represents the no.
of legitimate packets and pa represents
total no of packets received at victim.
224
set ns [new Simulator]
source tb_compat.tcl
#Create the topology nodes
foreach node { V S R1 R2 R3 R4 L1 L2 L3 L4 L5 L6 L7 L8 L9 L10 L11 L12 L13 L14 L15 L16 L17 L18
L19 L20 A1 A2 control }
{
#Create new node
set $node [$ns node]
#Define the OS image
tb-set-node-os [set $node] FC4-STD
#Have SEER install itself and startup when the node is ready
tb-set-node-startcmd [set $node] "sudo python /share/seer/v160/experiment-setup.py Basic"
}
#Create the topology links
set linkRV [$ns duplex-link $V $R1 100Mb 3ms DropTail]
set linkRS [$ns duplex-link $S $R1 100Mb 3ms DropTail]
set linkRA1 [$ns duplex-link $A1 $R3 100Mb 3ms DropTail]
set linkRA2 [$ns duplex-link $A2 $R4 100Mb 3ms DropTail]
set linkRR3 [$ns duplex-link $R2 $R3 100Mb 3ms DropTail]
set linkRR4 [$ns duplex-link $R2 $R4 100Mb 3ms DropTail]
set linkRR2 [$ns duplex-link $R2 $R1 1.5Mb 0ms DropTail]
set lannet0 [$ns make-lan "$L1 $L2 $L3 $L4 $L5 $R3" 100Mb 0ms]
set lannet1 [$ns make-lan "$L6 $L7 $L8 $L9 $L10 $R3" 100Mb 0ms]
set lannet2 [$ns make-lan "$L11 $L12 $L13 $L14 $L15 $R4" 100Mb 0ms]
set lannet3 [$ns make-lan "$L16 $L17 $L18 $L19 $L20 $R4" 100Mb 0ms]
$ns rtproto Static
$ns run
Figure 3. Experimental Topology Definition
The purpose of attack node is to congest the bandwidth of bottleneck link so that legitimate traffic could not
get accessed by the server S.
We have generated a random network consist of FTP clients, servers and attack source. Multiple legitimate
clients connected with server and one attack source is used as DDoS flooding attacker in our emulated
network,. This emulates the real situation of DDoS flooding attack.
B. Legitimate Traffic
We have used FTP traffic in our experiment is used and there are 20 legitimate client nodes which send
requests to the server S for 1-30 seconds and then 61-90 seconds with following thinking time. The
configuration of said traffic parameters used to send legitimate traffic is demonstrated in Table III :
TABLE III. EMULATION PARAMETERS USED IN EXPERIMENT
Parameters Values
Clients L1-L20
Server S
Attack Host A1
Thinking Time Minmax(0.01,0.1)
File Size Minmax(512,1024)
Emulation Time 90 sec
Bottleneck Bandwidth 1.5Mb
Access Bandwidth 100Mb
Legitimate Request Time 1-30 sec and 61-90 sec
Attack Time 31-60 sec
Attack Type DDoS Packet Flooding
Server Delay 3ms
Access Link Delay 3ms
Backbone Link Delay 0ms
225
C. Attack Traffic
In experimeny,we have used packet flooding attack to generate DDoS attack. Node A1 launches attack
towards S and thus consumes bandwidth of bottleneck in link R1-R2. UDP protocol is used for launching
attacks. Further attack types flat, ramp-up, pulse and ramp-pulse are used in our experiment. Attack traffic
from A1 starts at 31st second and stops at 60th second. Then we have analyzed impact of DDoS attacks on
FTP service. Table IV shows attack parameters used in our emulation experiment. We have generated
following flooding attack types:
Flat Attack: Flat attack is the attack in which high rate is achieved and maintained till the attack is
stopped.
Ramp-up Attack: In the Ramp-up attack the high rate is achieved gradually within the rise time specified
and is maintained until the attack is stopped.
Ramp-down Attack: In this attack the high rate is achieved gradually and after high time it falls to the low
rate with in low time.
Pulse Attack: Pulse attack is the attack in which the attack oscillates between high rate and low rate. It
remains at high rate for high time specified and then falls to low rate specified for the low tie specified and so
on.
Ramp-pulse Attack: In Ramp-pulse attack it is a mixture of Ramp-up, Rampdown and Pulse attack means it
used three attacks.
TABLE IV. ATTACK PARAMETERS USED IN EXPERIMENT [20]
VI. RESULTS AND DISCUSSIONS
The effect of DDoS attacks on the performance of FTP service is analyzed below:-
A. Throughput
For measuring the throughput, during a DDoS attack, backbone link is attacked to force the edge router at the
ISP of victim end to drop most legitimate packets. In Figure 4 and Figure 5, we have measured throughput in
terms of good-put and bad-put to get the measure of actual loss. The throughput is divided into good-put and
bad-put respectively. Good-put is defined as no. of bits per second of legitimate traffic that are received at the
server whereas bad-put gives no. of bits per second of attack traffic that are received at the server.
Attack Type Flooding Flooding Flooding
Flooding
Attack
Source
A1 A1 A1
A1
Attack Target S S S
S
Protocol UDP UDP UDP UDP
Length Min 100 200 200 100
Length Max 200 300 300 200
Flood Type Flat Ramp-up Pulse Ramp-pulse
High Rate 200 300 500 400
High Time 100 5000 6000 5000
Low Rate 100 100 200 200
Low Time 0 8000 5000 4000
Rise Shape 0 1.0 0 1.0
Rise Time 0 10000 0 10000
Fall Shape 0 0 0 1.0
Fall Time 0 0 0 10000
Sport Min 57 57 57 57
Sport Max 57 57 57 57
Dport Min 1000 1000 1000 1000
Dport Max 2000 2000 2000 2000
TCP Flags SYN SYN SYN SYN
226
B. Backbone Link Utilizationt
As Backbone Link utilization is defined as percentage of bandwidth that is carrying legitimate traffic. It is
shown in Figure 6, that Backbone Link utilization is nearly 100% without attack. During Attack, Backbone
Link utilization drops more than 50%.
C. Normal Packet Survival Ratio (NPSR)
As NPSR is defined as ratio of good-put and bad-put. This is the percentage of legitimate packets that can
survive during attack. NPSR should be high. We can measure impact of attack as a percentage of legitimate
packets delivered during the attack. If this percentage is high, service continues with little interruption. NPSR
starts decreasing with increased rate of attack traffic and as bandwidth of the link is limited, so legitimate
packets starts dropping. As shown in Figure 7, 100% legitimate packets are delivered without attack but
during attacks, only 50% legitimate packets are delivered.
Figure 4. Good-put of FTP traffic through bottleneck link during UDP Attack
Figure 5. Bad-put of FTP traffic through bottleneck link during UDP Attack
Figure 6. Average Bottleneck Bandwidth Utilization in FTP Service during UDP Attack
Goodput of FTP Service under UDP Attack
0.2
0.7
1.2
1.7
1.0
11.0
21.0
31.0
41.0
51.0
61.0
71.0
81.0
91.0Time (Sec)
Throughput(Mbps)
Flat Attack
Rampup Attack
Ramp-pulse Attack
Pulse Attack
Badput of FTP Service under UDP Attack
0
0.1
0.2
0.3
0.4
1.00
8.00
15.00
22.00
29.00
36.00
43.00
50.00
57.00
64.00
71.00
78.00
85.00
91.53
Time (Sec)
Throughput(Mbps)
Flat Attack
Ramp-up Attack
Ramp-pulse Attack
Pulse Attack
Avg Link Utilization of UDP Attack
0
20
40
60
80
100
120
1.0
8.0
15.0
22.0
29.0
36.0
43.0
50.0
57.0
64.0
71.0
78.0
85.0
Time (Sec)
%LinkUtilization
Flat Attack
Pulse Attack
Ramp-pulse Attack
Ramp-up Attack
227
Figure 7. Average Ratio of Legitimate FTP Packets Survival during UDP Attack
VII. CONCLUSIONS
DDoS attack incidents are increasing day by day. Not only, DDoS incidents are growing day by day but the
technique to attack, botnet size, and attack traffic are also attaining new heights. Effective mechanisms are
needed to elicit the information of attack to develop the potential defense mechanism. We evaluated our
metrics in experiments on the DETER testbed. DETER testbed allows to carry the DDoS attack experiment
in a secure environment. It also allows creating, plan, and iterating through a large range of experimental
scenarios with a relative ease. We pointed out the possibility of DDoS attacks on FTP application by
analyzing the characteristics of FTP application. DDoS attacks are launched on FTP server and measure the
impact of DDoS attacks on FTP service. Measurement of Service degradation due to DDoS attacks are
quantified in terms of Throughput, Normal Packet Survival Ratio and Backbone Link Utilization in this
paper. We generated attacks at different strengths so that DDoS attack’s impact can be measured. The attacks
are generated by keeping some realistic conditions in mind, such as Limited Bottleneck Bandwidth.
Moreover the quantitative measurements clearly indicated the impact of attack on FTP service.
Distributed Denial of Service attack is one of the major threats for current internet. In the present paper we
have measured the impact of DDoS attacks using a number of metrics. We are working on extending the
existing work as below: -
 Adding some more realistic features to the topology, traffic parameters and Attack parameters
(such as ISP Level topology, Large Number of Legitimate Clients, High Legitimate Traffic Rate,
High Attack Rate), so as to get more accurate results of DDoS attack’s influence on FTP services.
 Comparison of various DDoS Defense Mechanism using weighted metrics.
ACKNOWLEDGMENT
We would like to express our gratitude to Director, SBS State Technical Campus, Ferozepur, for providing
the academic environment to pursue research activities. We are extremely thankful to Dr. Krishan Kumar,
Associate Professor, Department of Computer Science & Engg., for their guidance and inputs. Finally the
authors wishes to appreciate the support extended by family and friends.
REFERENCES
[1] K. Xu, Z.L. Zhang, and S. Bhattacharyya, “Reducing unwanted traffic in a backbone network,” in Steps to Reducing
Unwanted Traffic on the Internet Workshop (SRUTI), 2005, pp. 9–15.
[2] A. Keromytis, V. Misra, D. Rubenstein(2002) SOS: Secure overlay services. In: ACMSIGCOMM Computer
Communication Review, Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and
Protocols for Computer Communications, Pittsburgh, PA, vol. 32, pp 61–72
[3] J. Mirkovic and P. Reiher, A University of Delaware Subcontract to UCLA,
www.lasr.cs.ucla.edu/Benchmarks_DDoS_Def_Eval.html.
[4] J. Mirkovic, E Arikan, S. Wei, R. Thomas, S. Fahmy, and P. Reiher. “Benchmarks for DDOS Defense Evaluation”,
In Proceedings of Military Communications Conference (MILCOM), pp. 1-10, 2006.
Normal Packet Survival Ratio
0
0.2
0.4
0.6
0.8
1
1.2
1.0
9.0
17.0
25.0
33.0
41.0
49.0
57.0
65.0
73.0
81.0
89.0
Time (Sec)
NPSR(Mbps)
Flat Attack
Pulse Attack
Ramp-pulse Attack
Ramp-up Attack
228
[5] Y. You. “A defense framework for flooding based DDoS Attacks”, M.S. Thesis, Queen’s University, Canada,2007.
[6] J. Mirkovic,P. Reiher,S. Fahmy,R. Thomas, A. Hussain, S. Schwab. “Measuring denial Of service”, 2nd ACM
workshop on Quality of protection QoP, pp. 53 – 58, 2006.
[7] S.Kumar,M.Singh,M.Sachdeva,K.Kumar,”Flooding based DDoS attacks and their influence on web services”,
International Journal of Computer Science and Information technology, Vol.2(3),pp 1131-1136,2011.
[8] K. Kumar. Protection from Distributed Denial of Service (DDoS) Attacks in ISP Domain, Ph.D. Thesis, Indian
Institute of Technology, Roorkee, India, 2007.
[9] J. Mirkovic, A. Hussain, B. Wilson, S. Fahmy, P. Reiher, R Thomas, W. M. Yao, S Schwab. “Towards user-centric
metrics for denial-of-service measurement” , in proceedings of the 2007 workshop on Experimental computer
science, San Diego, California.
[10] J. Mirkovic, S. Fahmy, P. Reiher, R. Thomas, A. Hussain, S. Schwab,and C. Ko. “Measuring Impact of DoS
Attacks”In Proceedings of the DETER Community Workshop on Cyber Security,Experimentation, June 2006.
[11] C. Ko, A. Hussain, S. Schwab, R. Thomas, and B. Wilson. “Towards systematic IDS evaluation", in Proceedings of
DETER Community Workshop, pp. 20- 23, June 2006.
[12] A. Sardana and R.C. Joshi, “An Integrated Honeypot Framework for Proactive Detection, Characterization and
Redirection of DDoS Attacks at ISP level,” International Journal of Information Assurance and Security (JIAS), 3
(1), pp. 1-15, March 2008. Available at http://www.mirlabs.org/jias/sardana.pdf.
[13] B.B. Gupta, R. C. Joshi, and M. Misra, “An ISP Level Solution to Combat DDoS Attacks using Combined
Statistical Based Approach,” Journal of Information Assurance and Security 3(2), 102-110, June 2008. Available at
http://www.mirlabs.org/jias/gupta.pdf.
[14] DoS Attacks Exceed 100 Gbps, Attack Surface Continues to Expand By Mike Lennon on February 01, 2011
available at http://www.securityweek.com/ddos-attacks-exceed-100-gbps-attacksurface-continues-expand .
[15] K.Arora, K.Kumar, M.Sachdeva,”Impact Analysis of Recent DdoS Attacks”, International Journal of Computer
Science and Engg., ISSN 0975-3397,Vol. 3,pp 877-884, 2011.
[16] D. kaur, M. Sachdeva and K. Kumar,” Study of Recent DDoS Attacks and Defense Evaluation Approaches”
International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459(online), Volume 3,
Issue 1, pp. 332-336, January 2013. http://www.ijetae.com/Volume3Issue1.html
[17] R. Chen, J. Park, and R.Marchany, “A Divide and Conquer Strategy for Thwarting Distributed Denial of Service
Attacks,” Computer Journal of IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 5, pp. 577-588,
2007.
[18] D. kaur, M. Sachdeva and K. Kumar,” Study of DDoS Attacks using Deter Testbed”,International Journal of
Computing and Business Research, IISN:2229-6166, Vol 3,May 2012.
[19] J. Mirkovic, S. Wei, A. Hussain, B. Wilson, R. Thomas, S. Schwab, S. Fahmy, R. Chertov, and P. Reiher. “DDoS
Benchmarks and Experimenter’s Workbench for the DETER Testbed”, Proceedings of Tridentcom, 2007.
[20] D. kaur, M. Sachdeva,” Study of Flooding Based DDoS Attacks and Their Effect Using Deter Testbed”,
International Journal of Research in Engg and Tech.,ISSN:2319-1163,Vol 2,pp 879-884,2013.

Weitere ähnliche Inhalte

Was ist angesagt?

Do s and d dos attacks at osi layers
Do s and d dos attacks at osi layersDo s and d dos attacks at osi layers
Do s and d dos attacks at osi layersHadeel Sadiq Obaid
 
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEMA SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEMcscpconf
 
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...cscpconf
 
2016 payment threats trends report
2016 payment threats trends report2016 payment threats trends report
2016 payment threats trends reportIan Beckett
 
Module 8 (denial of service)
Module 8 (denial of service)Module 8 (denial of service)
Module 8 (denial of service)Wail Hassan
 
2015-cloud-security-report-q2
2015-cloud-security-report-q22015-cloud-security-report-q2
2015-cloud-security-report-q2Gaurav Ahluwalia
 
TECHNICAL WHITE PAPER: The Continued rise of DDoS Attacks
TECHNICAL WHITE PAPER:  The Continued rise of DDoS AttacksTECHNICAL WHITE PAPER:  The Continued rise of DDoS Attacks
TECHNICAL WHITE PAPER: The Continued rise of DDoS AttacksSymantec
 
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...IJNSA Journal
 
Implementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud networkImplementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud networkSalam Shah
 
Enhancing the impregnability of linux servers
Enhancing the impregnability of linux serversEnhancing the impregnability of linux servers
Enhancing the impregnability of linux serversIJNSA Journal
 
IRJET- Cyber Attacks and its different Types
IRJET- Cyber Attacks and its different TypesIRJET- Cyber Attacks and its different Types
IRJET- Cyber Attacks and its different TypesIRJET Journal
 
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
Detection of the botnets’ low-rate DDoS attacks based on self-similarity
Detection of the botnets’ low-rate DDoS attacks  based on self-similarity Detection of the botnets’ low-rate DDoS attacks  based on self-similarity
Detection of the botnets’ low-rate DDoS attacks based on self-similarity IJECEIAES
 
IRJET- A Study of DDoS Attacks in Software Defined Networks
IRJET- A Study of DDoS Attacks in Software Defined NetworksIRJET- A Study of DDoS Attacks in Software Defined Networks
IRJET- A Study of DDoS Attacks in Software Defined NetworksIRJET Journal
 
IRJET- A Novel Survey on DOS Attacks
IRJET- A Novel Survey on DOS AttacksIRJET- A Novel Survey on DOS Attacks
IRJET- A Novel Survey on DOS AttacksIRJET Journal
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...ijsptm
 

Was ist angesagt? (17)

Do s and d dos attacks at osi layers
Do s and d dos attacks at osi layersDo s and d dos attacks at osi layers
Do s and d dos attacks at osi layers
 
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEMA SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
 
I0945056
I0945056I0945056
I0945056
 
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
 
2016 payment threats trends report
2016 payment threats trends report2016 payment threats trends report
2016 payment threats trends report
 
Module 8 (denial of service)
Module 8 (denial of service)Module 8 (denial of service)
Module 8 (denial of service)
 
2015-cloud-security-report-q2
2015-cloud-security-report-q22015-cloud-security-report-q2
2015-cloud-security-report-q2
 
TECHNICAL WHITE PAPER: The Continued rise of DDoS Attacks
TECHNICAL WHITE PAPER:  The Continued rise of DDoS AttacksTECHNICAL WHITE PAPER:  The Continued rise of DDoS Attacks
TECHNICAL WHITE PAPER: The Continued rise of DDoS Attacks
 
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
 
Implementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud networkImplementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud network
 
Enhancing the impregnability of linux servers
Enhancing the impregnability of linux serversEnhancing the impregnability of linux servers
Enhancing the impregnability of linux servers
 
IRJET- Cyber Attacks and its different Types
IRJET- Cyber Attacks and its different TypesIRJET- Cyber Attacks and its different Types
IRJET- Cyber Attacks and its different Types
 
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
Detection of the botnets’ low-rate DDoS attacks based on self-similarity
Detection of the botnets’ low-rate DDoS attacks  based on self-similarity Detection of the botnets’ low-rate DDoS attacks  based on self-similarity
Detection of the botnets’ low-rate DDoS attacks based on self-similarity
 
IRJET- A Study of DDoS Attacks in Software Defined Networks
IRJET- A Study of DDoS Attacks in Software Defined NetworksIRJET- A Study of DDoS Attacks in Software Defined Networks
IRJET- A Study of DDoS Attacks in Software Defined Networks
 
IRJET- A Novel Survey on DOS Attacks
IRJET- A Novel Survey on DOS AttacksIRJET- A Novel Survey on DOS Attacks
IRJET- A Novel Survey on DOS Attacks
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
 

Andere mochten auch (10)

84 11-21
84 11-2184 11-21
84 11-21
 
82 348-355
82 348-35582 348-355
82 348-355
 
62 328-337
62 328-33762 328-337
62 328-337
 
Warehouse packer kpi
Warehouse packer kpiWarehouse packer kpi
Warehouse packer kpi
 
74 136-143
74 136-14374 136-143
74 136-143
 
72 129-135
72 129-13572 129-135
72 129-135
 
80 152-157
80 152-15780 152-157
80 152-157
 
71 338-347
71 338-34771 338-347
71 338-347
 
69 122-128
69 122-12869 122-128
69 122-128
 
65 113-121
65 113-12165 113-121
65 113-121
 

Ähnlich wie Impact of DDoS Attacks on FTP Server Performance

Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )Sharon Lee
 
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...IJNSA Journal
 
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...IJNSA Journal
 
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS IJITCA Journal
 
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSPASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSIJNSA Journal
 
Study of flooding based ddos attacks and their effect using deter testbed
Study of flooding based ddos attacks and their effect using deter testbedStudy of flooding based ddos attacks and their effect using deter testbed
Study of flooding based ddos attacks and their effect using deter testbedeSAT Journals
 
Distributed reflection denial of service attack: A critical review
Distributed reflection denial of service attack: A critical review Distributed reflection denial of service attack: A critical review
Distributed reflection denial of service attack: A critical review IJECEIAES
 
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...IJNSA Journal
 
3-JournalofCommunicationsVol.14No.2February2019.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdf3-JournalofCommunicationsVol.14No.2February2019.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdfPrasannaKumarpanda2
 
Case Study: Q2 2014 Global DDoS Attack Report | Akamai Document
Case Study:  Q2 2014 Global DDoS Attack Report | Akamai  DocumentCase Study:  Q2 2014 Global DDoS Attack Report | Akamai  Document
Case Study: Q2 2014 Global DDoS Attack Report | Akamai DocumentProlexic
 
I034_I041_I052_DDOS Attacks_Presentation.pdf
I034_I041_I052_DDOS Attacks_Presentation.pdfI034_I041_I052_DDOS Attacks_Presentation.pdf
I034_I041_I052_DDOS Attacks_Presentation.pdfDevesh Pawar
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in ManetIRJET Journal
 
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONSA SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONSIJNSA Journal
 
A survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsA survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsIJNSA Journal
 
A survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsA survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsIJNSA Journal
 
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- DDOS Detection System using C4.5 Decision Tree AlgorithmIRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- DDOS Detection System using C4.5 Decision Tree AlgorithmIRJET Journal
 
Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Thamalsha Wijayarathna
 

Ähnlich wie Impact of DDoS Attacks on FTP Server Performance (20)

A041201010
A041201010A041201010
A041201010
 
Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )
 
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
 
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
 
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
 
10. 23757.pdf
10. 23757.pdf10. 23757.pdf
10. 23757.pdf
 
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSPASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
 
Study of flooding based ddos attacks and their effect using deter testbed
Study of flooding based ddos attacks and their effect using deter testbedStudy of flooding based ddos attacks and their effect using deter testbed
Study of flooding based ddos attacks and their effect using deter testbed
 
Distributed reflection denial of service attack: A critical review
Distributed reflection denial of service attack: A critical review Distributed reflection denial of service attack: A critical review
Distributed reflection denial of service attack: A critical review
 
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
 
3-JournalofCommunicationsVol.14No.2February2019.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdf3-JournalofCommunicationsVol.14No.2February2019.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdf
 
Ix3615551559
Ix3615551559Ix3615551559
Ix3615551559
 
Case Study: Q2 2014 Global DDoS Attack Report | Akamai Document
Case Study:  Q2 2014 Global DDoS Attack Report | Akamai  DocumentCase Study:  Q2 2014 Global DDoS Attack Report | Akamai  Document
Case Study: Q2 2014 Global DDoS Attack Report | Akamai Document
 
I034_I041_I052_DDOS Attacks_Presentation.pdf
I034_I041_I052_DDOS Attacks_Presentation.pdfI034_I041_I052_DDOS Attacks_Presentation.pdf
I034_I041_I052_DDOS Attacks_Presentation.pdf
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
 
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONSA SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS
 
A survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsA survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigations
 
A survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsA survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigations
 
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- DDOS Detection System using C4.5 Decision Tree AlgorithmIRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
 
Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World
 

Mehr von idescitation (20)

46 102-112
46 102-11246 102-112
46 102-112
 
47 292-298
47 292-29847 292-298
47 292-298
 
49 299-305
49 299-30549 299-305
49 299-305
 
57 306-311
57 306-31157 306-311
57 306-311
 
60 312-318
60 312-31860 312-318
60 312-318
 
5 1-10
5 1-105 1-10
5 1-10
 
11 69-81
11 69-8111 69-81
11 69-81
 
14 284-291
14 284-29114 284-291
14 284-291
 
15 82-87
15 82-8715 82-87
15 82-87
 
29 88-96
29 88-9629 88-96
29 88-96
 
43 97-101
43 97-10143 97-101
43 97-101
 
106 419-424
106 419-424106 419-424
106 419-424
 
114 425-433
114 425-433114 425-433
114 425-433
 
501 183-191
501 183-191501 183-191
501 183-191
 
503 434-438
503 434-438503 434-438
503 434-438
 
525 192-198
525 192-198525 192-198
525 192-198
 
528 439-449
528 439-449528 439-449
528 439-449
 
529 199-206
529 199-206529 199-206
529 199-206
 
538 207-219
538 207-219538 207-219
538 207-219
 
549 458-465
549 458-465549 458-465
549 458-465
 

Kürzlich hochgeladen

Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Kürzlich hochgeladen (20)

Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Impact of DDoS Attacks on FTP Server Performance

  • 1. Impact Analysis of DDoS Attacks on FTP Services Daljeet Kaur1 and Monika Sachdeva2 1 SBS State Technical Campus/ Deptt. Of Computer Science & Engg., Ferozepur Cantt-152004, Punjab, India Email: daljeetkaur617@gmail.com 2 SBS State Technical Campus/ Deptt. Of Computer Science & Engg., Ferozepur Cantt-152004, Punjab, India Email: monika.sal@rediffmail.com Abstract— Because the ability of Distributed Denial of Service (DDoS) attack creates huge volume of unwanted traffic so it is widely regarded as a major threat for the current Internet. A flooding-based DDoS attack is a very common way in which a victim machine is attacked by sending a large amount of malicious traffic. Because of these attacks,existing network-level congestion control mechanisms are inadequate for preventing service quality from deteriorating. Although a number of techniques have been proposed to defeat DDoS attacks but still It is very hard to detect and respond to DDoS attacks due to large and complex network environments, the use of source-address spoofing, and moreover its difficult to make difference between legitimate and attack traffic. To measure the impact of DDoS attack on FTP services, repeated research in cyber security that is important to the scientific advancement of the field is required. To fullfill this requirement, the cyber- DEfense Technology Experimental Research (DETER) testbed has been developed. In this paper, we have created one dumb-bell topology and generated background traffic as FTP traffic. We have launched different types of DDoS attacks along with FTP traffic by using attack tools available in DETER testbed. Finally we have measured impact of DDoS attack on FTP server in terms of metrics such as throughput, percentage link utilization, and normal packet survival ratio (NPSR). Index Terms— Normal Packet Survival Ratio (NPSR), vulnerability, confidentiality, botnet, DDoS, availability. I. INTRODUCTION As DDoS attacks are used to create unwanted traffic for increasing the problems of all Internet Service Providers (ISPs). This unwanted traffic is “malicious or unproductive traffic that attempts to compromise vulnerable hosts, propagate malware, spread spam, or deny valuable services”[1]. It degrade the service quality of networks. Unwanted traffic can be generated due to a flooding-based DDoS (Distributed Denial of Service) attack. A DDoS attack disturbs normal functionality of the Internet servers by exhausting resources. For exhausting resources, an attacker can create a huge volume of attack traffic to consume the bandwidth of the bottleneck link in the victim network. Confidentiality, authentication, message integrity and non repudiation are desirable security aspects for secure communication. More people are aware that availability and access control are also urgent requirements of secure communication because of the notorious Denial of Service (DoS) attacks that render by the illegitimate users into a network, host, or other piece of network infrastructure to harm them, especially it is done against the frequently visited websites of a number of high-profile companies or government websites. DOI: 02.ITC.2014.5.546 © Association of Computer Electronics and Electrical Engineers, 2014 Proc. of Int. Conf. on Recent Trends in Information, Telecommunication and Computing, ITC
  • 2. 221 An attacker or hacker gradually send attack programs on insecure machines. These compromised machines are called Handlers or Zombies and are collectively called bots and the attack network is called botnet in hacker’s community depending upon sophistication in logic of implanted programs. In this, hackers send control instructions to masters, which then communicate it to zombies for launching attack. As shown in Figure 1, typical DDoS attack has two stages, the first stage is to compromise susceptible systems that are accessible in the Internet and then install attack tools in these compromised systems. This is known as turning the computers into “zombies.” In the second stage, the attacker sends an attack command to the “zombies” through a secure channel to launch a bandwidth attack against the targeted victim(s). Figure 1. Attack Modus Operandi The current attacks on some web sites like Amazon, Yahoo, e-Bay and Microsoft and their resultant disruption of services have uncovered the weakness of the Internet to Distributed Denial of Service (DDoS) attacks. It has been observed through reports that TCP is used in more than 85% of the DoS attacks [2]. The TCP and UDP SYN flooding is the most commonly-used attack. It consists of a stream of spoofed and TCP and UDP SYN packets directed to a listening ports of the victim. The Web servers are not only but also any systems connected to the Internet providing UDP and TCP-based network services, such as FTP servers or Mail servers, are also susceptible to the UDP and TCP SYN flooding attacks. II. RELATED WORK To measure the effect of DDoS defense approaches, analyzation of impact of DDoS attack is very important. As per [3],[4], no benchmarks are available for measuring effectiveness of DDoS defense approaches. Mostly the existing strategies compare good-put and normal packet survival with and without attack and with defense [5]. Some of defense approaches [6] have calculated the response time. By measuring normal packets survival ration proves to be most important because it clearly reflects accuracy of the defense and normal packet loss [7], [8]. Jelena et al. [9], [10] have used percentage of failed transactions (transactions that do not follow QoS thresholds) as a metric to measure DDoS impact. They define a threshold-based model for the relevant traffic measurements, which is application specific. It indicates poor services quality when a measurement exceeds its threshold. One another metric i.e Server timeout has been also used [11]. Because legitimate traffic drop i.e. collateral damage is not indicated. Sardana et al. [12] have used good put, mean time between failure and average response time as performance metrics whereas Gupta et al. [13] have used two statistical metrics namely, Volume and Flow to detect DDoS attacks. As per [9] metrics such as good- put, bad-put, response time, number of active connections , ratio of average serve rate and request rate, and normal packet survival index [8] properly signal denial of service for two way applications such as HTTP, FTP and DNS, but not for media traffic that is sensitive to one-way delay, packet and jitter.
  • 3. 222 III. RECENT INCIDENTS It is observed that 2010 should be viewed as the year distributed denial of service (DDoS) attacks became main stream, says Arbor Networks [14]. TABLE I. RECENT DDOS INCIDENTS ON IMPORTANT WEB SITES [15] Arbor Networks [14] in its Sixth Annual Worldwide Infrastructure Security Report, released by revealed that DDoS attack Size has increased to 100 Gbps for first time and it is up by 1000% since 2005. This year has witnessed a sharp escalation in the scale and frequency of DDoS attack activity on the Internet. DDoS attacks have been launched against many high profile websites and popular Internet services. In addition to hitting the 100 Gbps attack barrier for the first time, application layer attacks hit an all-time high. The Table I lists some of the recent DDoS attacks incidents [14][15]. IV. PERFORMANCE METRICS Due to seriousness of DDoS problem and growing sophistication of attackers have led to development of numerous defense mechanisms [16],[17]. But the growing number of DDoS attacks and their financial implications still needs of a comprehensive solution. Moreover, as we studied that attackers share their attack codes to fight against these attacks, Internet community needs to devise better ways to accumulate details of these attacks. Only then a comprehensive solution against DDoS attacks can be devised. Technically, when DDoS attacks are launched, the various network performance metrics are affected. In current work, our focus is on measuring these network performance metrics and then comparing them with and without attacks. As mentioned in Table II, We have measured impact of DDoS attack using following metrics: Date DDoS target /Incidents Consequences/Description 2012, October Web site of Capital One Bank The incident was the second attack allegedly waged by a hacktivist group against the bank, 2012, March South Korea and United states Websites It is similar to those launched in 2009 2012, January Official Web-site of the office of the vice president of Russia It caused the site to be down by more than 15 hours. 2011, November Asian Ecommerce Company Flood of Traffic was launched and 250,000 Computers are infected with malware participated 2011, November Server The traffic load has been immense with several thou-sands request per second. 2011, October Site of National Election Com-mission of South Korea Attacks were launched during the morning when citizens would look up information and attack leads to fewer turnouts 2011, March On Blogging Platform Live Journal Experienced serious functionality problems for over 12 Hours and resumed on April 4 and 5, 2011 2010, December Master Card, PayPal, Visa and Post Finance Attack was launched in support of WikiLeaks.ch and its founder. Attack lasts for more than 16 hours. 2010, November Whistleblower site Wikileaks Attack size was 10 Gbps. Caused the site unavailable to visitors. Attack was launched to prevent release of secret cables. 2010, November whistleblower site Wikileaks Attack size was 2-4 Gbps. Attack was launched just after it released confidential US diplomatic cables. 2010, November Domain registrar Register.com Impacted DNS, hosting and webmail clients 2010, November Burma’s main Internet provider Disrupted most network traffic in and out of the country for 2 days. Geopolitical motivated attack. Attack size was of 1.09 Gbps (average) & 14.58 Gbps (maximum) . Attack vectors were TCP Syn/rst 85%, flooding 15%. 2010, September Fast growing botnet Botnet’s motive was to provide commercial service
  • 4. 223 TABLE II. METRICS FOR ATTACK’S IMPACT ANALYSIS  Throughput: Throughput is defined as the rate of sending or receiving of data by a network. It is a good measure of the channel capacity of a communications link, and connections to the internet are which is mostly rated in terms of how many bits they pass per second (bit/s). Throughput is measured in terms of good-put and bad-put respectively. Good-put is defined as no. of bits per second of legitimate traffic that are received at the server and bad-put is defined as no. of bits per second of attack traffic that are received at the server.  Backbone Link Utilization: Backbone Link Utilization is defined as percentage of bandwidth that is being used for good put (legitimate traffic)  Normal Packet Survival Ratio: This metric is used to measure impact of attack as we can measure impact of attack as a percentage of legitimate packets delivered during the attack. If this percentage is high, then the service continues with little interruption. V. EVALUATION IN TESTBED EXPERIMENT We have used DETER testbed to evaluate our metrics in experiments using SEER (Security Experimentation EnviRonment) GUI BETA6 environment [18][19]. This test bed is located at the USC Information Sciences Institute and UC Berkeley and security researchers used this testbed to evaluate attacks and defenses in a controlled environment. A. Experimental Topology Figure 2 shows the experimental topology and Figure 3 shows our experimental topology definition for FTP applications in which R1, R2, R3 and R4 are routers, node S is server and L1-L20 are clients. These clients are used to send legitimate requests to server S via router R1 and R2. The bandwidth of all links is to be set 100Mbps, and 1.5Mbps is the bandwidth of bottleneck link (R1-R2). In this topology node A1 acts as attacking node and it sends attack traffic to server S via router R1 and R2. The link between R1 and R2 is called bottleneck link. Figure 2. Experimental Topology Metric Description Throughput (α) Vα= (ьl + ьa)/Δ, ьl , ьa and Δ represents no. of legitimate bytes, no. of attack bytes and time window for analysis respectively. Percentage Link Utilization (£) £ represents percentage of bandwidth that is being used for good put. Normal Packet Survival Ratio (η) η = pl /( pl + pa ), pl represents the no. of legitimate packets and pa represents total no of packets received at victim.
  • 5. 224 set ns [new Simulator] source tb_compat.tcl #Create the topology nodes foreach node { V S R1 R2 R3 R4 L1 L2 L3 L4 L5 L6 L7 L8 L9 L10 L11 L12 L13 L14 L15 L16 L17 L18 L19 L20 A1 A2 control } { #Create new node set $node [$ns node] #Define the OS image tb-set-node-os [set $node] FC4-STD #Have SEER install itself and startup when the node is ready tb-set-node-startcmd [set $node] "sudo python /share/seer/v160/experiment-setup.py Basic" } #Create the topology links set linkRV [$ns duplex-link $V $R1 100Mb 3ms DropTail] set linkRS [$ns duplex-link $S $R1 100Mb 3ms DropTail] set linkRA1 [$ns duplex-link $A1 $R3 100Mb 3ms DropTail] set linkRA2 [$ns duplex-link $A2 $R4 100Mb 3ms DropTail] set linkRR3 [$ns duplex-link $R2 $R3 100Mb 3ms DropTail] set linkRR4 [$ns duplex-link $R2 $R4 100Mb 3ms DropTail] set linkRR2 [$ns duplex-link $R2 $R1 1.5Mb 0ms DropTail] set lannet0 [$ns make-lan "$L1 $L2 $L3 $L4 $L5 $R3" 100Mb 0ms] set lannet1 [$ns make-lan "$L6 $L7 $L8 $L9 $L10 $R3" 100Mb 0ms] set lannet2 [$ns make-lan "$L11 $L12 $L13 $L14 $L15 $R4" 100Mb 0ms] set lannet3 [$ns make-lan "$L16 $L17 $L18 $L19 $L20 $R4" 100Mb 0ms] $ns rtproto Static $ns run Figure 3. Experimental Topology Definition The purpose of attack node is to congest the bandwidth of bottleneck link so that legitimate traffic could not get accessed by the server S. We have generated a random network consist of FTP clients, servers and attack source. Multiple legitimate clients connected with server and one attack source is used as DDoS flooding attacker in our emulated network,. This emulates the real situation of DDoS flooding attack. B. Legitimate Traffic We have used FTP traffic in our experiment is used and there are 20 legitimate client nodes which send requests to the server S for 1-30 seconds and then 61-90 seconds with following thinking time. The configuration of said traffic parameters used to send legitimate traffic is demonstrated in Table III : TABLE III. EMULATION PARAMETERS USED IN EXPERIMENT Parameters Values Clients L1-L20 Server S Attack Host A1 Thinking Time Minmax(0.01,0.1) File Size Minmax(512,1024) Emulation Time 90 sec Bottleneck Bandwidth 1.5Mb Access Bandwidth 100Mb Legitimate Request Time 1-30 sec and 61-90 sec Attack Time 31-60 sec Attack Type DDoS Packet Flooding Server Delay 3ms Access Link Delay 3ms Backbone Link Delay 0ms
  • 6. 225 C. Attack Traffic In experimeny,we have used packet flooding attack to generate DDoS attack. Node A1 launches attack towards S and thus consumes bandwidth of bottleneck in link R1-R2. UDP protocol is used for launching attacks. Further attack types flat, ramp-up, pulse and ramp-pulse are used in our experiment. Attack traffic from A1 starts at 31st second and stops at 60th second. Then we have analyzed impact of DDoS attacks on FTP service. Table IV shows attack parameters used in our emulation experiment. We have generated following flooding attack types: Flat Attack: Flat attack is the attack in which high rate is achieved and maintained till the attack is stopped. Ramp-up Attack: In the Ramp-up attack the high rate is achieved gradually within the rise time specified and is maintained until the attack is stopped. Ramp-down Attack: In this attack the high rate is achieved gradually and after high time it falls to the low rate with in low time. Pulse Attack: Pulse attack is the attack in which the attack oscillates between high rate and low rate. It remains at high rate for high time specified and then falls to low rate specified for the low tie specified and so on. Ramp-pulse Attack: In Ramp-pulse attack it is a mixture of Ramp-up, Rampdown and Pulse attack means it used three attacks. TABLE IV. ATTACK PARAMETERS USED IN EXPERIMENT [20] VI. RESULTS AND DISCUSSIONS The effect of DDoS attacks on the performance of FTP service is analyzed below:- A. Throughput For measuring the throughput, during a DDoS attack, backbone link is attacked to force the edge router at the ISP of victim end to drop most legitimate packets. In Figure 4 and Figure 5, we have measured throughput in terms of good-put and bad-put to get the measure of actual loss. The throughput is divided into good-put and bad-put respectively. Good-put is defined as no. of bits per second of legitimate traffic that are received at the server whereas bad-put gives no. of bits per second of attack traffic that are received at the server. Attack Type Flooding Flooding Flooding Flooding Attack Source A1 A1 A1 A1 Attack Target S S S S Protocol UDP UDP UDP UDP Length Min 100 200 200 100 Length Max 200 300 300 200 Flood Type Flat Ramp-up Pulse Ramp-pulse High Rate 200 300 500 400 High Time 100 5000 6000 5000 Low Rate 100 100 200 200 Low Time 0 8000 5000 4000 Rise Shape 0 1.0 0 1.0 Rise Time 0 10000 0 10000 Fall Shape 0 0 0 1.0 Fall Time 0 0 0 10000 Sport Min 57 57 57 57 Sport Max 57 57 57 57 Dport Min 1000 1000 1000 1000 Dport Max 2000 2000 2000 2000 TCP Flags SYN SYN SYN SYN
  • 7. 226 B. Backbone Link Utilizationt As Backbone Link utilization is defined as percentage of bandwidth that is carrying legitimate traffic. It is shown in Figure 6, that Backbone Link utilization is nearly 100% without attack. During Attack, Backbone Link utilization drops more than 50%. C. Normal Packet Survival Ratio (NPSR) As NPSR is defined as ratio of good-put and bad-put. This is the percentage of legitimate packets that can survive during attack. NPSR should be high. We can measure impact of attack as a percentage of legitimate packets delivered during the attack. If this percentage is high, service continues with little interruption. NPSR starts decreasing with increased rate of attack traffic and as bandwidth of the link is limited, so legitimate packets starts dropping. As shown in Figure 7, 100% legitimate packets are delivered without attack but during attacks, only 50% legitimate packets are delivered. Figure 4. Good-put of FTP traffic through bottleneck link during UDP Attack Figure 5. Bad-put of FTP traffic through bottleneck link during UDP Attack Figure 6. Average Bottleneck Bandwidth Utilization in FTP Service during UDP Attack Goodput of FTP Service under UDP Attack 0.2 0.7 1.2 1.7 1.0 11.0 21.0 31.0 41.0 51.0 61.0 71.0 81.0 91.0Time (Sec) Throughput(Mbps) Flat Attack Rampup Attack Ramp-pulse Attack Pulse Attack Badput of FTP Service under UDP Attack 0 0.1 0.2 0.3 0.4 1.00 8.00 15.00 22.00 29.00 36.00 43.00 50.00 57.00 64.00 71.00 78.00 85.00 91.53 Time (Sec) Throughput(Mbps) Flat Attack Ramp-up Attack Ramp-pulse Attack Pulse Attack Avg Link Utilization of UDP Attack 0 20 40 60 80 100 120 1.0 8.0 15.0 22.0 29.0 36.0 43.0 50.0 57.0 64.0 71.0 78.0 85.0 Time (Sec) %LinkUtilization Flat Attack Pulse Attack Ramp-pulse Attack Ramp-up Attack
  • 8. 227 Figure 7. Average Ratio of Legitimate FTP Packets Survival during UDP Attack VII. CONCLUSIONS DDoS attack incidents are increasing day by day. Not only, DDoS incidents are growing day by day but the technique to attack, botnet size, and attack traffic are also attaining new heights. Effective mechanisms are needed to elicit the information of attack to develop the potential defense mechanism. We evaluated our metrics in experiments on the DETER testbed. DETER testbed allows to carry the DDoS attack experiment in a secure environment. It also allows creating, plan, and iterating through a large range of experimental scenarios with a relative ease. We pointed out the possibility of DDoS attacks on FTP application by analyzing the characteristics of FTP application. DDoS attacks are launched on FTP server and measure the impact of DDoS attacks on FTP service. Measurement of Service degradation due to DDoS attacks are quantified in terms of Throughput, Normal Packet Survival Ratio and Backbone Link Utilization in this paper. We generated attacks at different strengths so that DDoS attack’s impact can be measured. The attacks are generated by keeping some realistic conditions in mind, such as Limited Bottleneck Bandwidth. Moreover the quantitative measurements clearly indicated the impact of attack on FTP service. Distributed Denial of Service attack is one of the major threats for current internet. In the present paper we have measured the impact of DDoS attacks using a number of metrics. We are working on extending the existing work as below: -  Adding some more realistic features to the topology, traffic parameters and Attack parameters (such as ISP Level topology, Large Number of Legitimate Clients, High Legitimate Traffic Rate, High Attack Rate), so as to get more accurate results of DDoS attack’s influence on FTP services.  Comparison of various DDoS Defense Mechanism using weighted metrics. ACKNOWLEDGMENT We would like to express our gratitude to Director, SBS State Technical Campus, Ferozepur, for providing the academic environment to pursue research activities. We are extremely thankful to Dr. Krishan Kumar, Associate Professor, Department of Computer Science & Engg., for their guidance and inputs. Finally the authors wishes to appreciate the support extended by family and friends. REFERENCES [1] K. Xu, Z.L. Zhang, and S. Bhattacharyya, “Reducing unwanted traffic in a backbone network,” in Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI), 2005, pp. 9–15. [2] A. Keromytis, V. Misra, D. Rubenstein(2002) SOS: Secure overlay services. In: ACMSIGCOMM Computer Communication Review, Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pittsburgh, PA, vol. 32, pp 61–72 [3] J. Mirkovic and P. Reiher, A University of Delaware Subcontract to UCLA, www.lasr.cs.ucla.edu/Benchmarks_DDoS_Def_Eval.html. [4] J. Mirkovic, E Arikan, S. Wei, R. Thomas, S. Fahmy, and P. Reiher. “Benchmarks for DDOS Defense Evaluation”, In Proceedings of Military Communications Conference (MILCOM), pp. 1-10, 2006. Normal Packet Survival Ratio 0 0.2 0.4 0.6 0.8 1 1.2 1.0 9.0 17.0 25.0 33.0 41.0 49.0 57.0 65.0 73.0 81.0 89.0 Time (Sec) NPSR(Mbps) Flat Attack Pulse Attack Ramp-pulse Attack Ramp-up Attack
  • 9. 228 [5] Y. You. “A defense framework for flooding based DDoS Attacks”, M.S. Thesis, Queen’s University, Canada,2007. [6] J. Mirkovic,P. Reiher,S. Fahmy,R. Thomas, A. Hussain, S. Schwab. “Measuring denial Of service”, 2nd ACM workshop on Quality of protection QoP, pp. 53 – 58, 2006. [7] S.Kumar,M.Singh,M.Sachdeva,K.Kumar,”Flooding based DDoS attacks and their influence on web services”, International Journal of Computer Science and Information technology, Vol.2(3),pp 1131-1136,2011. [8] K. Kumar. Protection from Distributed Denial of Service (DDoS) Attacks in ISP Domain, Ph.D. Thesis, Indian Institute of Technology, Roorkee, India, 2007. [9] J. Mirkovic, A. Hussain, B. Wilson, S. Fahmy, P. Reiher, R Thomas, W. M. Yao, S Schwab. “Towards user-centric metrics for denial-of-service measurement” , in proceedings of the 2007 workshop on Experimental computer science, San Diego, California. [10] J. Mirkovic, S. Fahmy, P. Reiher, R. Thomas, A. Hussain, S. Schwab,and C. Ko. “Measuring Impact of DoS Attacks”In Proceedings of the DETER Community Workshop on Cyber Security,Experimentation, June 2006. [11] C. Ko, A. Hussain, S. Schwab, R. Thomas, and B. Wilson. “Towards systematic IDS evaluation", in Proceedings of DETER Community Workshop, pp. 20- 23, June 2006. [12] A. Sardana and R.C. Joshi, “An Integrated Honeypot Framework for Proactive Detection, Characterization and Redirection of DDoS Attacks at ISP level,” International Journal of Information Assurance and Security (JIAS), 3 (1), pp. 1-15, March 2008. Available at http://www.mirlabs.org/jias/sardana.pdf. [13] B.B. Gupta, R. C. Joshi, and M. Misra, “An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach,” Journal of Information Assurance and Security 3(2), 102-110, June 2008. Available at http://www.mirlabs.org/jias/gupta.pdf. [14] DoS Attacks Exceed 100 Gbps, Attack Surface Continues to Expand By Mike Lennon on February 01, 2011 available at http://www.securityweek.com/ddos-attacks-exceed-100-gbps-attacksurface-continues-expand . [15] K.Arora, K.Kumar, M.Sachdeva,”Impact Analysis of Recent DdoS Attacks”, International Journal of Computer Science and Engg., ISSN 0975-3397,Vol. 3,pp 877-884, 2011. [16] D. kaur, M. Sachdeva and K. Kumar,” Study of Recent DDoS Attacks and Defense Evaluation Approaches” International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459(online), Volume 3, Issue 1, pp. 332-336, January 2013. http://www.ijetae.com/Volume3Issue1.html [17] R. Chen, J. Park, and R.Marchany, “A Divide and Conquer Strategy for Thwarting Distributed Denial of Service Attacks,” Computer Journal of IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 5, pp. 577-588, 2007. [18] D. kaur, M. Sachdeva and K. Kumar,” Study of DDoS Attacks using Deter Testbed”,International Journal of Computing and Business Research, IISN:2229-6166, Vol 3,May 2012. [19] J. Mirkovic, S. Wei, A. Hussain, B. Wilson, R. Thomas, S. Schwab, S. Fahmy, R. Chertov, and P. Reiher. “DDoS Benchmarks and Experimenter’s Workbench for the DETER Testbed”, Proceedings of Tridentcom, 2007. [20] D. kaur, M. Sachdeva,” Study of Flooding Based DDoS Attacks and Their Effect Using Deter Testbed”, International Journal of Research in Engg and Tech.,ISSN:2319-1163,Vol 2,pp 879-884,2013.