Proceedings of the 18th ACM Conference on Innovation and Technology in Computer Science Education 2013
DOI: 10.1145/2462476.2465580
|View full text |Cite
|
Sign up to set email alerts
|

Using network packet generators and snort rules for teaching denial of service attacks

Abstract: Teaching ethical hacking techniques is fundamental to security education and allows students to better understand the ways in which computer and network systems fail. This paper discusses the implementation of comprehensive offensive hands-on lab exercises about four common Denial of Service (DoS) attacks. Moreover, the paper discusses the implementation of a defense technique against the DoS attacks using Snort tool, as an intrusion detection system. The impact of offering the exercises on the student perform… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
3
2

Relationship

3
5

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 11 publications
(3 reference statements)
0
10
0
Order By: Relevance
“…To detect the port scan threat, a few studies and commercial services have defined their thresholds in the unit of packets per second (PPS). To detect TCP-SYN and UDP flooding attacks, threshold values were set to 20 incomplete TCP-SYN and 10 UDP PPS in [33] and 200 incomplete TCP-SYN and 300 UDP PPS in [34]. Commercial network devices such as routers and firewalls also have default rules unique to them to detect these attacks as follows, 128 incomplete TCP-SYN and 500 UDP PPS for Cisco [35] and 25 incomplete TCP-SYN PPS in the Juniper Networks firewall [36].…”
Section: Limitation Of Supervised Learning-based Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…To detect the port scan threat, a few studies and commercial services have defined their thresholds in the unit of packets per second (PPS). To detect TCP-SYN and UDP flooding attacks, threshold values were set to 20 incomplete TCP-SYN and 10 UDP PPS in [33] and 200 incomplete TCP-SYN and 300 UDP PPS in [34]. Commercial network devices such as routers and firewalls also have default rules unique to them to detect these attacks as follows, 128 incomplete TCP-SYN and 500 UDP PPS for Cisco [35] and 25 incomplete TCP-SYN PPS in the Juniper Networks firewall [36].…”
Section: Limitation Of Supervised Learning-based Approachmentioning
confidence: 99%
“…For example, let us consider M = 30 and N = 1. Then, it requires 1 s for [35,36], and 2 s for [33,34], as shown in Figure 5.…”
Section: Dt-fs: Dt-based Fast and Stealthy Natd Identificationmentioning
confidence: 99%
“…In fact, teaching ethical hacking techniques has become a vital component of information security programs that aim to produce competent information security professionals [2][3][4][5][6][7][8][9][10][11]. Therefore, information security students need exposure to offensive techniques, along with defensive techniques.…”
Section: Introductionmentioning
confidence: 99%
“…Hands-on lab exercises on various information security topics have focus primarily on desktop environments, whether physical or virtual, and consequently can be implemented only inside isolated laboratories environments (Whitman et al 2014;Trabelsi and Alketbi 2013;Trabelsi 2011;Vigna 2003a, b;Yuan and Zhong 2008;Caltagirone et al 2006;Hill et al 2001, andTrabelsi andMustafa 2014). Recently, the computing landscape, however, is shifting.…”
Section: Introductionmentioning
confidence: 99%