Abstract
Recently, Distributed Denial-of-Service (DDoS) attacks have been increasing and reports show that the number of DDoS attacks in 2020 increased three times compared to the same quarter of the previous year. In this paper, we develop an attack test environment for evaluation of DDoS attacks, which also includes a basic Distributed Reflection Denial of Service (DRDoS) attack environment. The environment uses virtualization technology in order to adopt the environment easily in various systems. In the attack test environment, the attacker network configurations, reflector, and target are separated. We adjust both the attacker and the reflection server in order to increase the power of the attack. In the study by Suzuki et al. [1], a Unified Threat Management (UTM) was first stopped by external DDoS attacks. In this paper, we confirm that the UTM in our environment stops intermittently under TCP Flood attacks, thus, we consider that our environment succeeded in reproducing virtually the study by Suzuki et al. [1]. We also confirm that in our DRDoS attack test environment, the http communication to the target server is disturbed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Suzuki, H., Ui, T., Furukawa, S., Yuhara, D., Naruse, S., Asakawa, Y., Nagai, K., Hasegawa, O.: Consideration on implementation of pseudo attack by distributed denial-of-service attack and verification of UTM. JIPS Jpn 21, 21–28 (2017)
Open Resolver Project. http://www.openresolverproject.org/. Accessed 19 Dec 2019
DDoS attacks in Q2 2020. https://securelist.com/ddos-attacks-in-q2-2020/98077/. Accessed 1 Jan 2021
hping3 - Linux man page. https://linux.die.net/man/8/hping3. Accessed 1 Jan 2021
Offensive python saddam. https://github.com/OffensivePython/Saddam. Accessed 1 Jan 2021
Kondo, M., Shintani, N., Makita, D., Yoshioka, K., Matsumoto, T.: Study on analyzing Memcached DRDoS attacks and their infrastructures. IEICE Technical report, pp. 114–119
Bekeneva, Y.A., Shorov, A.V.: Simulation of DRDoS-attacks and protection systems against them. In: IEEE SCM (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix
Appendix
This study was supported in part by JSPS KAKENHI Grant Number JP17K00182 and JP18K02917.
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Tokuyama, R., Futa, Y., Suzuki, H., Okazaki, H. (2021). Virtual Environment for Analysis and Evaluation of DDoS Attacks. In: Barolli, L., Woungang, I., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2021. Lecture Notes in Networks and Systems, vol 227. Springer, Cham. https://doi.org/10.1007/978-3-030-75078-7_46
Download citation
DOI: https://doi.org/10.1007/978-3-030-75078-7_46
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-75077-0
Online ISBN: 978-3-030-75078-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)