AGENT-BASED SIMULATION OF DDOS ATTACKS AND DEFENSE MECHANISMS

Authors

  • Igor Kotenko
  • Alexander Ulanov

DOI:

https://doi.org/10.47839/ijc.4.2.343

Keywords:

Agents, Agent-based Modeling and Simulation, Computer network attacks, Distributed Denial of Service, Defense mechanisms

Abstract

The paper considers an approach to modeling and simulation of cyber-wars in Internet between the teams of software agents. According to this approach, the cybernetic opposition of malefactors and security systems is represented by the interaction of two different teams of software agents – malefactors’ team and defense team. The approach is considered by an example of modeling and simulation of “Distributed Denial of Service” (DDoS) attacks and protection against them. The paper also describes the software environment for multi-agent simulation of defense mechanisms against DDoS attacks developed by the authors and different experiments. The main components of the software environment are outlined. One of the numerous experiments on protection against DDoS attacks is described in detail. The environment developed is based OMNeT++ INET Framework.

References

R. Canonico, D. Cotroneo, L. Peluso, S.P. Romano, G. Ventre. Programming routers to improve network security. Proceedings of the OPENSIG 2001 Workshop Next Generation Network Programming, 2001.

S. Chen, Q. Song. Perimeter-Based Defense against High Bandwidth DDoS Attacks. IEEE Transactions on Parallel and Distributed Systems, Vol.16, No.7, 2005.

P.R. Cohen, H.J. Levesque. Teamwork, Nous, Vol.25, No.4, 1991.

X. Fan, J. Yen. Modeling and Simulating Human Teamwork Behaviors Using Intelligent Agents, Journal of Physics of Life Reviews, Vol. 1, No.3, 2004.

T.M. Gil, M. Poletto. MULTOPS: a data-structure for bandwidth attack detection. Proceedings of 10th Usenix Security Symposium, 2001.

B. Grosz, S. Kraus. Collaborative plans for complex group actions, Artificial Intelligence, Vol.86, 1996.

N. Jennings. Controlling cooperative problem solving in industrial multi-agent systems using joint intentions, Artificial Intelligence, No.75, 1995.

J-Sim homepage. www.j-sim.org

A.D. Keromytis, V. Misra, D. Rubenstein. SOS: An architecture for mitigating DDoS attacks, Journal on Selected Areas in Communications, Vol. 21, 2003.

I. Kotenko, L. Stankevich. The Control of Teams of Autonomous Objects in the Time-Constrained Environments. Proceedings of the IEEE International Conference “Artificial Intelligence Systems”, IEEE Computer Society, 2002.

I. Kotenko. Agent-Based Modeling and Simulation of Cyber-Warfare between Malefactors and Security Agents in Internet. 19th European Simulation Multiconference “Simulation in wider Europe”, 2005.

I. Kotenko, A. Ulanov. Multiagent modeling and simulation of agents’ competition for network resources availability. Second International Workshop on Safety and Security in Multiagent Systems, Utrecht, The Netherlands, 2005.

V. Kuznetsov, A. Simkin, H. Sandstrom. An evaluation of different ip traceback approaches. Proceeding of the 4th International Conference on Information and Communications Security, 2002.

M. Li, C.H. Chi, W. Zhao, W.J. Jia, D.Y. Long. Decision Analysis of Statistically Detecting Distributed Denial-of-Service Flooding Attacks, Int. J. Information Technology and Decision Making, Vol.2, No.3, 2003.

R. Mahajan, S.M. Bellovin, S. Floyd. Controlling High Bandwidth Aggregates in the Network, Computer Communications Review, Vol.32, No.3, 2002.

J. Mirkovic, S. Dietrich, D. Dittrich, P. Reiher. Internet Denial of Service: Attack and Defense Mechanisms. Prentice Hall PTR, 2004.

J. Mirkovic, M. Robinson, P. Reiher, G. Oikonomou. Distributed Defense Against DDOS Attacks. University of Delaware CIS Department Technical Report CIS-TR-2005-02, 2005.

NS2 homepage. http://www.isi.edu/nsnam/ns/

OMNeT++ homepage. http://www.omnetpp. org/

K. Park, H. Lee. On the Effectiveness of Route-based Packet Filtering For Distributed DoS Attack Prevention in Power-law Internet. Proceedings ACM SIGCOMM, 2001.

C. Papadopoulos, R. Lindell, I. Mehringer, A. Hussain, R. Govindan. Cossack: Coordinated suppression of simultaneous attacks. Proceedings of DISCEX III, 2003.

T. Peng, L. Christopher, R. Kotagiri. Protection from Distributed Denial of Service Attack Using History-based IP Filtering. IEEE International Conference on Communications, 2003.

SSF Net homepage. www.ssfnet.org

M. Tambe. Towards flexible teamwork, Journal of AI Research, Vol.7, 1997.

M. Tambe, D.V. Pynadath. Towards Heterogeneous Agent Teams, Lecture Notes in Artificial Intelligence, Vol.2086, 2001.

Y. Xiang, W. Zhou. An Active Distributed Defense System to Protect Web Applications from DDoS Attacks. The Sixth International Conference on Information Integration and Web Based Application & Services, 2004.

D. Xuan, R. Bettati, W. Zhao. A gateway-based defense system for distributed dos attacks in high-speed networks, IEEE Transactions on Systems, Man, and Cybernetics, 2002.

Y. Xiang, W. Zhou, M. Chowdhury. A Survey of Active and Passive Defence Mechanisms against DDoS Attacks. Technical Report, TR C04/02, School of Information Technology, Deakin University, Australia, March 2004.

J. Yen, J. Yin, T.R. Ioerger, M. Miller, D. Xu, R. Volz. CAST: Collaborative agents for simulating teamworks. Proceedings of IJCAI'2001, 2001.

Downloads

Published

2014-08-01

How to Cite

Kotenko, I., & Ulanov, A. (2014). AGENT-BASED SIMULATION OF DDOS ATTACKS AND DEFENSE MECHANISMS. International Journal of Computing, 4(2), 113-123. https://doi.org/10.47839/ijc.4.2.343

Issue

Section

Articles