A Simulation Model for the Analysis of DDoS Amplification Attacks
Angelo Furfaro, Giovanna Malena, Lorena Molina
DIMES – University of Calabria
I-87036 Rende (CS) – Italy
Email: a.furfaro@dimes.unical.it
malena.giovanna@libero.it
l.molina@dimes.unical.it
Andrea Parise
Open Knowledge Technologies s.r.l.
Piazza Vermicelli
I-87036 Rende (CS) – Italy
Email: andrea.parise@okt-srl.com
Abstract — The ever increasing growth of Internet has
achieved global connections among millions of networks and
devices which exchange information through computer systems
in companies, organizations and governments. At the same
time, hackers have developed skills that imply critical issues
related to network and information security. Distributed Denial
of Service (DDoS) is one of the most sophisticated and effective
attack techniques. In view of this, it is fundamental that DDoS
prevention/defense algorithms could be evaluated through suit-
able discrete-event simulation models in order to assess their
effectiveness before they get deployed in production systems.
This paper proposes a simulation model for the analysis of a
specific type of DDoS, i.e. DDoS amplification, that can exploit
NTP or DNS protocols. The developed model, which has been
implemented within NeSSi
2
, allowed to compare the effects of
the attack under the two scenarios.
Keywords – DDoS Amplification Attacks; Network Time Pro-
tocol; Modelling and Simulation; Network Simulation;
I. INTRODUCTION
Nowadays network security is threatened by various types
of cyber attacks. Among these, the most common and effec-
tive one is the Distributed Denial-of-Services (DDoS) [1].
A DDoS attack is a malicious attempt to coordinate the
behaviors of several of hosts in order for them to flood a
victim host with a high number of packets, so that its band-
width and/or its computational resources are exhausted [2].
To performs the first task, the attacker try to generate an
huge volume of network traffic in order to flood the link that
connects the victim with the network. This type of DDoS
operates at the network level of the ISO/OSI stack. The
second type of attack is instead performed at application
or session levels. During a DDoS attack, the aggressor
orchestrates the behavior of a network (botnet) of slave
hosts (zombies), which have previously been infected by a
malicious code, through messages that indicate a specific
victim to be flooded [3]. DDoS attacks can be classified
according to various dimensions. A taxonomy based on
degree of automation, exploited vulnerability, attack rate
dynamics and impact is reported in [4] and it is summarized
in Fig. 1. A recent survey on defense mechanisms against
DDoS is given in [5].
Figure 1. DDoS attacks classification
In this paper, we focus on two techniques adopted together
in order to increase the effect of a DDoS attack, i.e. reflection
and amplification. A reflection-based DDoS attack exploits
the IP spoofing vulnerability. The attacker sends a network
request, with a forged IP source address (i.e. the victim’s
address) to a network entity (usually a server) which is
exploited as reflector [6], i.e. it will direct its responses to
the fake source address. This technique can be performed
both on TCP and UDP protocols. In the case of the TCP
this reflection attack is also known as SYN-ACK or SYN-
flood [5]. When executed over UDP, a typical attack employs
a DNS server as reflector.
The impact of reflection attacks can be augmented when
the size of the response generated by the reflector is much
bigger than that of the request. Such effect is referred to
as amplification. Usually, DDoS amplification attacks are
performed on connectionless protocols.
A particular amplification technique, the so called smurf
attack [7], exploits a misconfiguration of a local network that
2015 17th UKSIM-AMSS International Conference on Modelling and Simulation
978-1-4799-8713-9/15 $31.00 © 2015 IEEE
DOI 10.1109/UKSim.2015.52
267