Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Design of System on Chip for Generating SYN Flood Attack to Test the Performance of the Security System

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 122 - Number 7
Year of Publication: 2015
Authors:
Shaila R Ghanti
G. M. Naik
10.5120/21711-4831

Shaila R Ghanti and G.m.naik. Article: Design of System on Chip for Generating SYN Flood Attack to Test the Performance of the Security System. International Journal of Computer Applications 122(7):14-17, July 2015. Full text available. BibTeX

@article{key:article,
	author = {Shaila R Ghanti and G.m.naik},
	title = {Article: Design of System on Chip for Generating SYN Flood Attack to Test the Performance of the Security System},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {122},
	number = {7},
	pages = {14-17},
	month = {July},
	note = {Full text available}
}

Abstract

DDoS attack is generated by the attacker on the server, so that the genuine clients will not have access to the services provided by server. To protect servers from such attacks, large variety of security systems are available. The best security system can be selected by comparing the performance of these systems. There is a need to generate attacks at very high speed to test the performance of security system. This manuscript presents the design of FPGA based reconfigurable hardware System-on-Chip (SoC), that can generate the SYN flood attacks at high speed in real time. The SoC SYN flood attack is implemented using the soft core NIOS II processor, Triple_Speed Ethernet, etc. The manuscript also compares the attacks generated using such hardware based SoC SYN flood attacker with the SYN flood attacks generated using purely software based tool hping3. It is found that the attacks generated using FPGA based system is much faster than software based tool. The same hardware design can be used to generate many different types of attacks such as spoofed, non-spoofed, layer 3 , layer 4 attacks like TCP flood attack, UDP attack, ICMP flood attack, TCP SYN-ACK attack, TCP FIN-ACK attack, etc. Such attacks are essential to benchmark the security systems. The proposed technique can be used as industry standard to benchmark the performance of the security systems.

References

  • Neustar Annual DDoS Attacks and Impact Report "THE DANGER DEEPENS" 2014 http://www. neustar. biz/resources/whitepapers/ddos-protection/2014-annual-ddos-attacks-and-impact-report. pdf
  • "Download Hping3 source code" . http://www. hping. org/download. html
  • "Introduction to FPGA Technology: Top 5 Benefits" http://www. ni. com/white-paper/6984/en/, Publish Date: Apr 16, 2012 | 52 Ratings | 3. 69 out of 5
  • Andrew S. Tanenbaum, "Computer Networks", 4th edition
  • "Learn" "Enhance" "download Wireshark" . http://www. wireshark. org/
  • Prof Bill Buchanan, Flavien Flandrin, Richard Macfarlane, Dr Jamie Graves, Edinburgh Napier University, 10 Colinton Road, Edinburgh, EH10 5DT, "A Methodology to Evaluate Rate-Based Intrusion Prevention System against Distributed Denial-of-Service (DDoS)"
  • Venkata Yellapragada, Venkat Gaddam, shripal Pandey a project report on "Network Packet generators" April 17, 2009
  • G. Adam Covington, Glen Gibb, John W. Lockwood, Nick McKeown, " A Packet Generator on the NetFPGA Platform" http://yuba. stanford. edu/netfpga/documents/NetFPGA-FCCM-2009-Packet_Generator. pdf
  • "Triple-Speed Ethernet Megacore Function user Guide" www. altera. com/literature/ug/ug_ethernet. pdf Document last updated for Altera Complete Design Suite version:13. 0 Document publication date: May 2013
  • Using Triple-Speed Ethernet on DE4 Boards. ftp://ftp. altera. com/up/pub/Altera_Material/12. 0/Tutorials/DE4/using_triple_speed_ethernet. pdf
  • Jami Aditya and Priyanka Priyadarsini, "Application of Ethernet over powerline Communication" Department of Electronics and Communication Engineering National Institute of Technology, Rourkela May, 2013. http://ethesis. nitrkl. ac. in/4695/http://generalengineering. sjsu. edu/docs/pdf/mse_prj_rpts/spring2009/Network%20Packet%20Generator_By_Pandya_etal_EMD. pdf
  • "The TCP/IP Guide–A TCP/IP Reference you can understand" http://www. tcpipguide. com/free/index. htm
  • "Free Software download" Xampp webserver http://download. cnet. com/BitNami-for-XAMPP/3001-2070_4-75924895. html?hlndr=1