Proc. of Int. Conf. on Recent Trends in Information, Telecommunication and Computing, ITC
Impact Analysis of DDoS Attacks on FTP Services Daljeet Kaur1 and Monika Sachdeva2 1
SBS State Technical Campus/ Deptt. Of Computer Science & Engg., Ferozepur Cantt-152004, Punjab, India Email: daljeetkaur617@gmail.com 2 SBS State Technical Campus/ Deptt. Of Computer Science & Engg., Ferozepur Cantt-152004, Punjab, India Email: monika.sal@rediffmail.com
Abstract— Because the ability of Distributed Denial of Service (DDoS) attack creates huge volume of unwanted traffic so it is widely regarded as a major threat for the current Internet. A flooding-based DDoS attack is a very common way in which a victim machine is attacked by sending a large amount of malicious traffic. Because of these attacks,existing network-level congestion control mechanisms are inadequate for preventing service quality from deteriorating. Although a number of techniques have been proposed to defeat DDoS attacks but still It is very hard to detect and respond to DDoS attacks due to large and complex network environments, the use of source-address spoofing, and moreover its difficult to make difference between legitimate and attack traffic. To measure the impact of DDoS attack on FTP services, repeated research in cyber security that is important to the scientific advancement of the field is required. To fullfill this requirement, the cyberDEfense Technology Experimental Research (DETER) testbed has been developed. In this paper, we have created one dumb-bell topology and generated background traffic as FTP traffic. We have launched different types of DDoS attacks along with FTP traffic by using attack tools available in DETER testbed. Finally we have measured impact of DDoS attack on FTP server in terms of metrics such as throughput, percentage link utilization, and normal packet survival ratio (NPSR). Index Terms— Normal Packet Survival Ratio (NPSR), vulnerability, confidentiality, botnet, DDoS, availability.
I. INTRODUCTION As DDoS attacks are used to create unwanted traffic for increasing the problems of all Internet Service Providers (ISPs). This unwanted traffic is “malicious or unproductive traffic that attempts to compromise vulnerable hosts, propagate malware, spread spam, or deny valuable services”[1]. It degrade the service quality of networks. Unwanted traffic can be generated due to a flooding-based DDoS (Distributed Denial of Service) attack. A DDoS attack disturbs normal functionality of the Internet servers by exhausting resources. For exhausting resources, an attacker can create a huge volume of attack traffic to consume the bandwidth of the bottleneck link in the victim network. Confidentiality, authentication, message integrity and non repudiation are desirable security aspects for secure communication. More people are aware that availability and access control are also urgent requirements of secure communication because of the notorious Denial of Service (DoS) attacks that render by the illegitimate users into a network, host, or other piece of network infrastructure to harm them, especially it is done against the frequently visited websites of a number of high-profile companies or government websites. DOI: 02.ITC.2014.5.546 © Association of Computer Electronics and Electrical Engineers, 2014