Distributed Denial of Service (DDoS) attacks using Botnets became widely used in the Internet because of its efficiency and easy implementation. We will present in this paper a new architecture that stops DDoS attacks based on Botnet C&C (Command & control) and identify the Botmaster (the bots owner) machine. Unlike the researches done in the attack trace-back algorithms, the aim of this architecture is not only to determine the Internet Relay Chat (IRC) servers used to control the Botnet. But also to remove the bots from the infected machines and to revel the Botmaster identityThis architecture is composed of a DDoS attacks detection agents*, spy agents* and a central agent* that coordinates between the other agents during the attack trace-back process. The trace-back process is based on hacking method in order to infiltrate the Botnet and get information about the attacker and the bots he uses. This architecture is designed to be used by the Internet service providers.
Network emulation and simulation tools are widely used for preproduction, studies and researches purposes. This success is due to the quality of result they provide compared to the real equipments. Another advantage of the network simulators is that the cost of studies and experiences are exponentially reduced especially for networks that use expensive hardware or a big number of nodes. In the work done for fighting against Distributed Denial of Service (DDoS) based on Botnet (malicious programs that take the control of many machines on behalf of the owners in order to attack services or send spams), a real time test of the trace-back and counter-attack algorithms is needed. So the emulation tool should be scalable in order to create thousands of bots with fewer resources. Unfortunately, the existing emulation/simulation tools suffer from some limitations like the nodes number that cannot exceed hundreds, have simulation concept or not scalable. That's why it was decided to develope a new network emulator that implements huge networks. The aim of this paper is to present this new scalable framework that help to emulate network equipments and application based on UDP and TCP protocols with a huge number of nodes. It was developed basically for emulating DDoS attacks based on Botnets but it can be used for any other purposes like stress test for HTTP servers or telephony over IP services etc. BACKGROUND AND MOTIVATIONThis section explains the existing test methods and the reasons behind developing such framework. The existing test methodsMany researches were done for detecting DDoS or fighting against them by providing new architectures and algorithms like probabilistic packet marking algorithm that allows detecting the attack source [4] and the architecture that detects the DDoS/Brute forcing attacks for destroying the Botnet behind [5]. However, researchers have to implement a big
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with đź’™ for researchers
Part of the Research Solutions Family.