Presentation is loading. Please wait.

Presentation is loading. Please wait.

Xenia Mountrouidou (Dr. X)

Similar presentations


Presentation on theme: "Xenia Mountrouidou (Dr. X)"— Presentation transcript:

1 Xenia Mountrouidou (Dr. X)
Denial of Service Xenia Mountrouidou (Dr. X)

2 Outline Start reserving your topology Learning Goals Audience
Background Variations

3 Reserve topology Go to: https://goo.gl/OuDw8M
Use RSpec erPaths/files/DoS_RSpec.txt Normally this file should be saved with .xml extension Let’s look into an RSpec Change Clemson to some other aggregate

4 Learning Goals Apply IT components knowledge Produce network traffic
Hypothesize about effects of network attack Create and analyze a network attack Use Wireshark, GENI

5 Audience Freshmen, Sophomores Non-CS and CS majors
Some background work is needed

6 Background IT Components Computer Networks Command Line GENI DoS OVS

7 IT Components Have the students research: what is a workstation, what is a server, switch, router etc. Kahoot quiz on IT Components

8 Computer Networks Khan Academy Internet 101
Sans Cyber Aces Tutorials on Networking … and of course a Kahoot quiz

9 GENI & Command line GENI Command line class from code academy
GENI map Simulation vs Emulation Programmable network Command line class from code academy In class demonstration and application of command line: navigating through folders, edit, copy, move.

10 What is Denial of Service?
A computer network attack that is designed to deplete resources and prevent legitimate users from accessing a site Can target small and large businesses Traffic flood, large payloads sent slowly, amplification attack Resources: Memory CPU Bandwidth

11 Digital attack map

12 Computer Network Attacks
Passive: Scanning, Reconnaissance Active: Distributed Denial of Service Spoofing Man in the middle

13 Denial of Service Lab for non-CS Majors
Pre-installed topology ping - verification Iperf - performance Hping3 - DoS Hypothesis testing Experiments on GENI GENI: Virtual laboratory for networking and distributed systems research and education

14 DDoS TCP SYN Flood Insights: Traffic pattern Spoofed IPs
Send Spoofed SYN Send SYN-ACK Resend SYN-ACK Attacker Server Spoofed Client Insights: Traffic pattern Spoofed IPs

15 Simulating Denial of Service
Real machines Small network Attack traffic Regular internet traffic You control all these!

16 Variations GENI Desktop More than one attackers
Analyze packets, find SYN

17 Questions? Let’s experiment!

18 Useful source: FYE Security 101 site:


Download ppt "Xenia Mountrouidou (Dr. X)"

Similar presentations


Ads by Google