2009 Cybersecurity Applications &Amp; Technology Conference for Homeland Security 2009
DOI: 10.1109/catch.2009.23
|View full text |Cite
|
Sign up to set email alerts
|

How to Test DoS Defenses

Abstract: DoS defense evaluation methods influence how well test results predict performance in real deployment. This paper surveys existing approaches and criticizes their simplicity and the lack of realism. We summarize our work on improving DoS evaluation via development of standardized benchmarks and performance metrics. We end with guidelines on efficiently improving DoS evaluation, in the short and in the long term.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
3
3
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(9 citation statements)
references
References 35 publications
0
9
0
Order By: Relevance
“…• Simulation: In this method, attackers, targets and network devices are all simulated [6]. NS-2 and Opnet are two examples of network simulators that are used.…”
Section: Testbed Design Strategiesmentioning
confidence: 99%
“…• Simulation: In this method, attackers, targets and network devices are all simulated [6]. NS-2 and Opnet are two examples of network simulators that are used.…”
Section: Testbed Design Strategiesmentioning
confidence: 99%
“…All the sources (including attackers) send 10 requests per second. According to Mirkovic et al [27], we set 4 seconds as the request timeout. DoC Attack.…”
Section: B Bandwidth Guarantees Under Botnet Attacksmentioning
confidence: 99%
“…There are a number of sources of attack free HTTP traces provided by the Internet Traffic Archives. Analysis on these datasets have led some researchers to suggest it does not resemble real network data.Table 10 illustrates Existing Dataset for DDoS defence evaluation [75].…”
Section: Datasets and Toolsmentioning
confidence: 99%