With the increased reliance on wired networks, the vulnerability of these networks to malicious activities such as Distributed Denial of Service (DDoS) attacks becomes a significant concern. In this project, we utilize NS-3 to model accurate simulations of various DDos attack scenarios targeting the communication. The objective is to comprehend and contrast the impact of each attack on the performance of the targeted network. The simulation setup allows us to deliberately generate and transmit attack traffic to the wired network. This makes it possible to observe and analyze various performance metrics, including throughput, packet loss, and checksum. Through comparing these metrics, we gain insights into the distinct behaviors and possible countermeasures for each type of DDoS attack. The outcomes of the simulation provide valuable insights for the development of more efficient and effective algorithms, techniques, and procedures to mitigate these attacks in wired networks environments. By understanding the behaviors of these attacks and their effects on network performance, we can design better strategies to enhance the durability and security of wired networks against DDos threats.
Presentation slides: click here for a PDF version of the slides.
Report: download report in MS Word
Report: download report in PDF
[1] Cloudflare, "What is a DDoS attack? " cloudflare, https://www.cloudflare.com/en-ca/learning/ddos/what-is-a-ddos-attack/ [accessed Feb. 23, 2024].
[2] FORTINET, “What is a DDoS Attack?” Fortinet, https://www.fortinet.com/resources/cyberglossary/ddos-attack [accessed Feb. 23, 2024].
[3] I. Kotenko and A. Ulanov, “Simulation of Internet DDoS Attacks and Defense.” Information Security, https://doi.org/10.1007/11836810_24. [accessed Feb. 23, 2024].
[4] L. Arockiam Lawrence and B. Vani, "A Survey of Denial of Service Attacks and its Countermeasures on Wireless Network." International Journal on Computer Science and Engineering, https://www.researchgate.net/publication/49965401_A_Survey_of_Denial_of_Service_Attacks_and_it%27s_Countermeasures_on_Wireless_Network [accessed Feb. 23, 2024].
[5] M. Poongothai and M. Sathyakala, “Simulation and analysis of DDoS attacks.” IEEE Xplore, https://ieeexplore.ieee.org/abstract/document/6513885 [accessed Feb. 23, 2024].
[6] R. Davis, “The History and Future of DDoS Attacks.” CyberSecurity Magazine, https://cybersecurity-magazine.com/the-history-and-future-of-ddos-attacks/ [accessed Feb. 23, 2024].
[7] Radware, “DDoS Attacks History.” Radware, https://www.radware.com/security/ddos-knowledge-center/ddos-chronicles/ddos-attacks-history/ [accessed Feb. 23, 2024].
[8] M. Raza, “Denial-of-Service Attacks: History, Techniques, & Prevention.” https://www.splunk.com/en_us/blog/learn/dos-denial-of-service-attacks.html [accessed Feb. 23, 2024].
[9] A. Balyk, et al., “Using graphic network simulator 3 for DDoS attacks simulation.” International Journal of Computing,16.4 (2017): 219-225 [accessed Feb. 23, 2024].
[10] B. Singh, K. Kumar and A. Bhandari, “Simulation study of application layer DDoS attack.” International Conference on Green Computing and Internet of Things (ICGCIoT), https://dl.acm.org/doi/10.1109/ICGCIoT.2015.7380589 [accessed Feb. 23, 2024].
[11] L. Trajkovic et al., “Distributed Denial of Service Attacks.” https://www.sfu.ca/~ljilja/papers/smc00_edited.pdf [accessed Feb. 23, 2024].
[12] T. Kenyon, “How are DDoS attacks impacting businesses and services?” Cybermagazine, https://cybermagazine.com/cyber-security/how-are-ddos-attacks-impacting-businesses-and-services [accessed Mar. 20, 2024].
[13] E. Fahmy, “How DDoS attacks impact business continuity.” edge, https://www.edgemiddleeast.com/security/how-ddos-attacks-impact-business-continuity [accessed Mar. 20, 2024].
[14] L. Peterson and B. Davie, “6.2 Queuing Disciplines.” Computer Networks: A Systems Approach, https://book.systemsapproach.org/congestion/queuing.html [accessed Mar. 20, 2024].
[15] Y. Guo et al., “Modeling distributed denial of service attack in advanced metering infrastructure.” IEEE Xplore, https://ieeexplore.ieee.org/abstract/document/7131828/authors [accessed Mar. 20, 2024].
[16] Ali, S (2023) DDOS_attacks_simulation_using_NS3 [Source Code]. https://github.com/shahdzzz/DDOS_attacks_simualtion_using_NS3 [accessed Mar. 20, 2024].
[17] Cloudfare, “UDP flood DDoS attack.” cloudfare, https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/ [accessed Mar. 21, 2024].
[18] Cloudfare, “SYN flood attack.” cloudfare, https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/ [accessed Mar. 21, 2024].
[19] imperva, “Smurf DDoS attack.” imperva, https://www.imperva.com/learn/ddos/smurf-attack-ddos/ [accessed Mar. 21, 2024].