Skip to main content

Virtual Environment for Analysis and Evaluation of DDoS Attacks

  • Conference paper
  • First Online:
Advanced Information Networking and Applications (AINA 2021)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 227))

Abstract

Recently, Distributed Denial-of-Service (DDoS) attacks have been increasing and reports show that the number of DDoS attacks in 2020 increased three times compared to the same quarter of the previous year. In this paper, we develop an attack test environment for evaluation of DDoS attacks, which also includes a basic Distributed Reflection Denial of Service (DRDoS) attack environment. The environment uses virtualization technology in order to adopt the environment easily in various systems. In the attack test environment, the attacker network configurations, reflector, and target are separated. We adjust both the attacker and the reflection server in order to increase the power of the attack. In the study by Suzuki et al. [1], a Unified Threat Management (UTM) was first stopped by external DDoS attacks. In this paper, we confirm that the UTM in our environment stops intermittently under TCP Flood attacks, thus, we consider that our environment succeeded in reproducing virtually the study by Suzuki et al. [1]. We also confirm that in our DRDoS attack test environment, the http communication to the target server is disturbed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Suzuki, H., Ui, T., Furukawa, S., Yuhara, D., Naruse, S., Asakawa, Y., Nagai, K., Hasegawa, O.: Consideration on implementation of pseudo attack by distributed denial-of-service attack and verification of UTM. JIPS Jpn 21, 21–28 (2017)

    Google Scholar 

  2. Open Resolver Project. http://www.openresolverproject.org/. Accessed 19 Dec 2019

  3. DDoS attacks in Q2 2020. https://securelist.com/ddos-attacks-in-q2-2020/98077/. Accessed 1 Jan 2021

  4. hping3 - Linux man page. https://linux.die.net/man/8/hping3. Accessed 1 Jan 2021

  5. Offensive python saddam. https://github.com/OffensivePython/Saddam. Accessed 1 Jan 2021

  6. Kondo, M., Shintani, N., Makita, D., Yoshioka, K., Matsumoto, T.: Study on analyzing Memcached DRDoS attacks and their infrastructures. IEICE Technical report, pp. 114–119

    Google Scholar 

  7. Bekeneva, Y.A., Shorov, A.V.: Simulation of DRDoS-attacks and protection systems against them. In: IEEE SCM (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ryo Tokuyama .

Editor information

Editors and Affiliations

Appendix

Appendix

This study was supported in part by JSPS KAKENHI Grant Number JP17K00182 and JP18K02917.

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tokuyama, R., Futa, Y., Suzuki, H., Okazaki, H. (2021). Virtual Environment for Analysis and Evaluation of DDoS Attacks. In: Barolli, L., Woungang, I., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2021. Lecture Notes in Networks and Systems, vol 227. Springer, Cham. https://doi.org/10.1007/978-3-030-75078-7_46

Download citation

Publish with us

Policies and ethics