Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. Simulate the behavior of probabilistic packet marking (as explained in Class) using a programming language (e.g., C, C++, Java or Python). You will compare

1. Simulate the behavior of probabilistic packet marking (as explained in Class) using a programming language (e.g., C, C++, Java or Python). You will compare the performance of node sampling algorithm and the edge sampling algorithm. The algorithms are given in the class slides and reading article. Present the accuracy of the model in identifying the source of the attack. Show your results using plots/graphs and comment on the findings. Inputs: Topology of the network. Number of routers and their connecting edges eventually connecting them to the victim, V. (Hint: You can use topology files as inputs and read from the file to generate topology in the program. Make sure the routers are somewhat closely connected). Input Guideline: DO NOT use more than d=15 hops. Use the number of routers, as 20 spread around for your runs. Each router has unique IP addresses. (Hint: to keep it simple, you can assume a smaller unique number for routers; it is not necessary to assume 32 bit IP address). Use the number of branches as 3, 4, or 5 for your runs. Assume attacker or attackers are at the end of the routers. In case of multiple attackers, assume at most one attacker per branch. (Hint: there can be branches at the end of which there is no attacker). If there is no attacker at the end of the branch, assume normal user. Guideline for different simulation runs and comparisons: Assume different packet marking probability, p = 0.2, 0.4, 0.5, 0.6, 0.8 for your runs.

CS 445/645: Internet Security Due: Monday, February 13, 2023 Homework 1 Spring 2023 Assume normal users send packets at a much slower rate than the attackers. Attackers use syn flood or ping flood attacks. You can use attackers rate of pumping packets is x times higher than normal users. Choose different x values for your different runs. Outputs: For a DoS attack, use node sampling and edge sampling algorithms to trace back the source of the attack. Answer the following. 1) For a single attacker, compare the accuracy of the traceback for both node sampling and edge sampling. Are you able to accurately find the path back to the attacker if there is one single attacker and one normal user? Compare the above results for the following cases: a) p = 0.2, 0.4, 0.5, 0.6, 0.8 b) x = 10, 100, 1000 and show your comparison results through plots. Explain the physical significance of your plots. 2) How many packets are you receiving before producing an accurate result of the traceback. Compare both the algorithms. 3) Repeat the above experiment with two attackers creating DoS attacks and one normal user. Show your results, plots and explanations. Marks distribution: Q1 [8] Q2 [4] Q3 [8] CS 445/645: Internet Security Due: Monday, February 13, 2023 Homework 1 Spring 2023 Assume normal users send packets at a much slower rate than the attackers. Attackers use syn flood or ping flood attacks. You can use attackers rate of pumping packets is x times higher than normal users. Choose different x values for your different runs. Outputs: For a DoS attack, use node sampling and edge sampling algorithms to trace back the source of the attack. Answer the following. 1) For a single attacker, compare the accuracy of the traceback for both node sampling and edge sampling. Are you able to accurately find the path back to the attacker if there is one single attacker and one normal user? Compare the above results for the following cases: a) p = 0.2, 0.4, 0.5, 0.6, 0.8 b) x = 10, 100, 1000 and show your comparison results through plots. Explain the physical significance of your plots. 2) How many packets are you receiving before producing an accurate result of the traceback. Compare both the algorithms. 3) Repeat the above experiment with two attackers creating DoS attacks and one normal user. Show your results, plots and explanations.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Spatial Databases A Tour

Authors: Shashi Shekhar, Sanjay Chawla

1st Edition

0130174807, 978-0130174802

More Books

Students also viewed these Databases questions