How to Test DoS Defenses

Jelena Mirkovic, Sonia Fahmy, Peter Reiher, Roshan K. Thomas
2009 2009 Cybersecurity Applications & Technology Conference for Homeland Security  
DoS defense evaluation methods influence how well test results predict performance in real deployment. This paper surveys existing approaches and criticizes their simplicity and the lack of realism. We summarize our work on improving DoS evaluation via development of standardized benchmarks and performance metrics. We end with guidelines on efficiently improving DoS evaluation, in the short and in the long term. * This material is based on research sponsored by the Department of Homeland
more » ... y under contract number FA8750-05-2-0197. The views and conclusions contained herein are those of the authors only. Network communication involves many devices and protocols, all of which must work correctly to deliver satisfactory service. Any device, protocol or end-service in this chain can be targeted to create denial-of-service. The attack can be performed by a single attacking machine -DoS -
doi:10.1109/catch.2009.23 fatcat:43y7so6uqveixdsyvft5a2gegq