Download presentation
Presentation is loading. Please wait.
1
Xenia Mountrouidou (Dr. X)
Denial of Service Xenia Mountrouidou (Dr. X)
2
Outline Start reserving your topology Learning Goals Audience
Background Variations
3
Reserve topology Go to: https://goo.gl/OuDw8M
Use RSpec erPaths/files/DoS_RSpec.txt Normally this file should be saved with .xml extension Let’s look into an RSpec Change Clemson to some other aggregate
4
Learning Goals Apply IT components knowledge Produce network traffic
Hypothesize about effects of network attack Create and analyze a network attack Use Wireshark, GENI
5
Audience Freshmen, Sophomores Non-CS and CS majors
Some background work is needed
6
Background IT Components Computer Networks Command Line GENI DoS OVS
7
IT Components Have the students research: what is a workstation, what is a server, switch, router etc. Kahoot quiz on IT Components
8
Computer Networks Khan Academy Internet 101
Sans Cyber Aces Tutorials on Networking … and of course a Kahoot quiz
9
GENI & Command line GENI Command line class from code academy
GENI map Simulation vs Emulation Programmable network Command line class from code academy In class demonstration and application of command line: navigating through folders, edit, copy, move.
10
What is Denial of Service?
A computer network attack that is designed to deplete resources and prevent legitimate users from accessing a site Can target small and large businesses Traffic flood, large payloads sent slowly, amplification attack Resources: Memory CPU Bandwidth
11
Digital attack map
12
Computer Network Attacks
Passive: Scanning, Reconnaissance Active: Distributed Denial of Service Spoofing Man in the middle
13
Denial of Service Lab for non-CS Majors
Pre-installed topology ping - verification Iperf - performance Hping3 - DoS Hypothesis testing Experiments on GENI GENI: Virtual laboratory for networking and distributed systems research and education
14
DDoS TCP SYN Flood Insights: Traffic pattern Spoofed IPs
Send Spoofed SYN Send SYN-ACK Resend SYN-ACK Attacker Server Spoofed Client Insights: Traffic pattern Spoofed IPs
15
Simulating Denial of Service
Real machines Small network Attack traffic Regular internet traffic You control all these!
16
Variations GENI Desktop More than one attackers
Analyze packets, find SYN
17
Questions? Let’s experiment!
18
Useful source: FYE Security 101 site:
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.