=Paper=
{{Paper
|id=Vol-1830/Paper71
|storemode=property
|title=Development of a Traffic Analyzer for the Detection of DDoS Attack Source
|pdfUrl=https://ceur-ws.org/Vol-1830/Paper71.pdf
|volume=Vol-1830
|authors=Joseph Adebayo Ojeniyi,Maruf Olalekan Balogun,Fasola Sanjo,Onwudebelu Ugochukwu
}}
==Development of a Traffic Analyzer for the Detection of DDoS Attack Source==
International Conference on Information and Communication Technology and Its Applications (ICTA 2016) Federal University of Technology, Minna, Nigeria November 28 – 30, 2016 Development of a Traffic Analyzer for the Detection of DDoS Attack Source Joseph Adebayo Ojeniyi1, Maruf Olalekan Balogun2, Fasola Sanjo3, and Onwudebelu Ugochukwu4 1,2 Department of Cyber Security Science, Federal University Technology, Minna, Nigeria 3 Department of Computer Science, University of Ibadan, Ibadan, Nigeria 4 Department of Computer Science, Federal University Ndufu-Alike Ikwo, Abakaliki, Nigeria 1 ojeniyija@futminna.edu.ng, 2marufbyte@gmail.com, 3sanjo@elsmedia.com, 4anelectugocy@yahoo.com Abstract— Distributed Denial of Service (DDoS) attack has can be behind other attack like the attacks reputable been the most devastating attack on computer network and companies or countries. internet at large. Several techniques have been deployed to mitigate this attack. However, detecting the source of DDoS II. LITERATURE REVIEW attack remains unsolved in the literature. The aim of this paper is to develop a traffic analyzer for the detection of DDoS attack source. The approach used consists of sniffing, analysis A. Related Work and isolation of source and destination IP address with their At the present time, more and more critical respective timestamp of packets that flow through the network infrastructures arebeing used by organizations and they are in which system was deployed. Traffic analyzer has the ability increasingly relying upon the internet in order to carry out of saving the captured packet for possible examination and their day to day operations [1]. Internet attacks are at analysis by forensic expert. Traffic Analyzer was developed as increasing rate and threat are also increasing to cripple a console based application using python programming Information Technology infrastructures [2]. language which is limited to run on Linux distribution. A With the increase in large attacks that directly targets the network was simulated using GNS3 consisting of the attacker large businesses and government institutions around the and the victim machine (both run on kali Linux). The result of world, one of the most significant issues that can be this work was shown after the developed traffic analyzer was used to collect traffic from the simulated victim machine, considered by both commercial and governmental thereby showing the traffic and their header information. The organizations is to protect its information from malicious arrival time of each IP address that comes inside the network jeopardizing that is, the adoption network security is more was logged. With this the analyzer was used to determine the important now more than ever because of the increase in type and source of DDoS attack. attacks every day by day due to the automated tools being use against internet-connected systems by attackers [1]–[4]. Keywords-network attack, DoS, DDoS, traffic analyzer, Denial of service (DoS) or Distributed Denial of Service detection log, python programming language (DDoS) attacks is one of the most devastated internet attack against internet connected system in this era and they can be defined as attempts to make a computing or network resource unavailable to its users or as an attack that pose a I. INTRODUCTION highly damageable threat to the CIA (Confidentiality, From the beginning of 21st century, there have been an Integrity and Availability) of services that resides on the evolving threat toour cyberspace, these attacks are classified network [4]–[6]. DoS attack often involve using a single majorly as attack against confidentiality, integrity and computer in preventing the legitimate users from accessing availability of information. Distributed Denialof Service the network resources while the advance DoS attack which is (DDoS) attack have been the most devastating attack on our Distributed Denial of Service (DDoS) attack involves network and internet at large and they are being tagged as the multiple compromised computer being used to send attacks attack against availability of information whereby the to a victim at the same period during the attacking time [4], information that are meant to be available for a legitimate [5]. DDoS attack is mainly achieved with the help of botnet user is being denied by the server because the attacker is which are refers to as compromised systems under the accessing the server and sending unsolicited request to this instructions of their master or handlers [7]. Botnet can also machine thereby causing the legitimate client inability to be refer to as zombie and they are responsible for generating access its resources. A Distributed Denial of Service (DDoS) the attack traffic towards the victim [8]. is where the source of attack is more than one and often Basically, DDoS attack architecture consists of three thousands of unique or spoof IP addresses. Perpetrators of components which are master, slave and the victim. They DDoS attacks often target sites or services hosted on high- collaboratively work together towards achieving their profile web servers such as banks, credit card payment malicious goals. Figure l shows the model of a typical DDoS gateways, but motives of revenge, blackmail or hacktivism attack. The master takes control of the botnet without the 111 International Conference on Information and Communication Technology and Its Applications (ICTA 2016) knowledge of their owners, because they have been hash table which can be refer to as dictionary in python. If previously infected with a Trojan or a backdoor program. the information is existing, it will add the occurrence of this The compromised machines called botnet are being control IP addresses into their respective hash table for further by the bot-master, often through Command and Control network traffic analysis. (C&C) channels, and simultaneously used to track a victim using the public internet infrastructure [9]. B. UML Use Case Diagram Internet crime like DDoS attack is still at large and on the This section uses the UML use case diagram to explain rise there is not yet an effective and efficient system to know the proposed system. Use case diagram has been known to where the malicious packet come from, or where the suspect consist of mainly the actors and their respective functions. is located so that he/she can be identify, track, report, arrest Figure 3 depict the proposed system in which the actor is and punish for its offence [1]. represented by as proposed system with its respective features which to sniff packet, analyze traffic and report engine. The sniff packet use case represents the ability of the system to be able to capture packet that comes in and out of the network computer putting the following criteria into consideration. Source and Destination IP address Source and Destination MAC address Source and Destination Port number The network traffic analysis component would check for the following information which can be useful in case if there is an existence of DDoS attack in that particular network. The packet protocol The packet header The report engine consists of two functions which are logging evidence creation after the system termination. The following information are logged in order to examine the existence of DDoS attack. Source and Destination IP address Figure 1. Showing the typical set-up of a DDoS attack Their respective timestamp B. Summary of Review start The summary of the review based on this research work New Packet_In is shown below in Table 1. III. SYSTEM DESIGN Read packet header In order to have detailed understanding about the Isolate source and proposed system. This section explains functions of the destination IP and MAC proposed system using system flowchart and UML Use Case address Diagram Store host and dest IP A. System flowchart into hash table The propose traffic analyzer for detection of DDoS attack source flowchart is depicted below in figure 2. Because of NO Does the IP exist YES the sniffing and reporting features of this system, running the system will enable it to start capturing packet from the Ethernet frame either through wireless or wired network. Add to hash Add to the no table of occurrence This packet would contain the following relevant in hash table information: Source and Destination IP address Log info Source and Destination MAC address Source and Destination Port number save After the collection of this information, it will store the Stop destination and source IP address of every new packet and Figure 2. Attack source flowchart then check if the source and destination is existing inside the 112 International Conference on Information and Communication Technology and Its Applications (ICTA 2016) TABLE I. SUMMARY OF RELATED WORKS Author/Year Methodology Achievement Limitation [10] Using entropy based algorithm Entropy network based anomaly detection Limited to solving single label method problem RBPBoost was trained and tested with Improving on RBPBoost Algorithm Limited to known attack detection [11] DARPA, CONFICKER, [12] IBR analyzer using python Able to develop a system for analyzing capture Limited to characterizing IBR data from IBR information to their respective payloads [13] Data analysis and reporting tool. Ability to receive a .pcap file and transform it Limited to processing smaller into report format packets [14] Modelling and Countermeasures Using An information-theoretic framework models Limited to small and homogenous Botnet and Honeypots for flooding attacks using Botnet on ITM and network effective attack detection using Honeypots [4] A data mining Centroid-based rule DDoS attack Detection and defense approach Stability of centroid-based rules for method non-spherical shapes [2] Virtual honeynet data collection Detection of IRC and HTTP botnet Focusing on botnet detection on mechanism network –level traces [9] Using ensemble-based DDoS attack DDoS detection techniques Limited to equal weight simple detection and rate of change of unseen correlation IP addresses [15] Greedy layer wise unsupervised training Training deep neural network for DDoS Techniques works for unsupervised strategy detection training only [16] Valuation method of probability loss of Detection technique for DoS/DDoS/DRDoS Only applicable in stationary mode arbitrary request passing on mass attacks in network mass service network service [17] A statistical CUSUM-based detection Detection of DDoS attack Technique depends on CUSUM technique [8] Entropy based algorithm Early detection of DDoS attack in software Limited to detection of attack when defined network the DDoS attack is targeting a host not the entire network [18] Combining multiple independent data A measurement study for analyzing DDoS sources to study large DDoS attacks attack for multiple data sources. [19] Using PMD technique and labelling of Detection and isolation of DDoS attack with The both techniques work separately incoming packet in detection of sniffing packet sniffing in a SCADA network in detecting their target and DDoS attack [1] Flexible Deterministic Packet Marking An IP traceback system that is having high Processing of packet consume more technique probability of finding the source of DDoS resources attack [20] Flexible Deterministic Packet Marking An IP traceback system that is having high It requires human intervention. i.e. it technique probability of finding the source of DDoS is not automated. May not be able to attack give high performance in a large network The timestamp would be logged first followed by the 1) Hardware and Software requirement respective IP address in order to map host IP address with GNS3 software for the DDoS embedded network their respective source address of every flow of packet in and simulation out of the network in order to ease the investigation of Kali linux operating system (for both and victim and potential DDoS attack source and where the attack is really attacker’s machine). targeting. Virtual machine (Virtual Box or VMware) The specification that would be needed in other to perform achieve this project is minimum of 500GB hard drive, 8GB RAM and 2.35GHz quad core IV. . METHODOLOGY laptop 2) Tools and libraries needed: A. System Requirement a) Python programming language: Python was chosen In order to achieve this project, there are the requirement over the other programming languages because python is that must be met for both the software that would be used in beginner’s friendly and the choice of language penetration building the system and the hardware specification needed to testers and forensic analyst and entire cyber security field at simulate the DDoS embedded network. large. 113 International Conference on Information and Communication Technology and Its Applications (ICTA 2016) 1) Graphical Network Simulator3 (GNS3) Sniff Packet GNS3 is a network simulator that allows simulation of networks. It consist of Dynamips (a cisco router emulator) and also contains Pemu (a cisco PIX firewall emulator) as well as tight incorporation with wireshark (packet capture Network Traffic and protocol analyzer). Analysis 2) Hping hping is a command-line oriented TCP/IP packet analyzer/assembler. It supports TCP, UDP, ICMP and RAW- IP protocols, has a traceroute mode, the capability to send Report Engine files between an enclosed channel, and many other features. one of the features of hping command is network testing, this network testing feature was use to perform DDoS attack Proposed System against the victim’s machine. Figure 3. use case diagram of traffic analyzer C. DDoS Test Bed to test Traffic Analyzer The system testing environment was achieved by b) Socket: This module offers access to the socket simulating a network which was in carrying out Distributed interface of BSD and is available on all current Unix Denialof Service attack of the attacker’s machine while the systems, Windows, MacOS, and possibly additional develop system is set up on the victim’s machine. Figure 4 platforms. This module provides everything you need to shows how this was achieved using Graphical Network build socket servers and clients. Simulator (GNS3). The router shown in this figure 4 was configured in order c) Struct library: It does changes between Python to connect the two-dissimilar network of /24 netmask, the values and C structs characterized as Python bytes objects attacker’s network (192.168.1.0/24) and the victim’s network which are use to handle binary data stored in files or from (10.10.0.0/24). The Kali linux operating system to act as our network connections, amid other sources. Format Strings is attacker and victim in our test bed. use as solid descriptions of the C structs plan and the intended change to/from Python values. d) Datetime library: This module is responsible for providing classes in order to manipulate dates and times in both simple and multipart ways. While date and time arithmetic is maintained in this module, the motivation of this application is to efficiently extract attribute for output formatting and manipulation e) Time library: It provides various time-related functions. Almost all the functions defined in this module call platform C library functions with the similar name. f) Textwrap: It is one of the module that perform text processing services. This module provides the functions of wrapping or filling one or two text strings. It also has some convenience functions, as well as Textwraper, the class that Figure 4. DDoS test bed for the system testing does all the work. Textwrap is would be use in the formatting and arrangement of string. D. System Testing and Result The developed system was implemented on the Kali V. IMPLEMENTATION AND RESULTS linux clone because is the system that was configured to act as the victim machine while the Kali linux at the left-hand A. Introduction side of figure 4 was configured to act as our attacker machine. Figure 5 shows the implementation of our This section reports the implementation of the developed developed system using python programming language system (Traffic Analyzer), and also Distributed Denialof version 3. Both Kali linux and Kali linux clone are assigned Service (DDoS) attack network simulation which was used IP address of 192.168.1.2 and 10.10.1.3 respectively. as the test bed in order to carry out the system testing of the When this developed system is run on any system, it developed system. turns the system network interface card (NIC) into promiscuous mode then it begin to sniff every that comes in B. Tools needed for system implementation and out of that network the system is connected to, analysis Below are the tools that are used in achieving our DDoS the traffic and log IP addresses information by mapping the test bed in order to further test the workability of our source and destination IP address with their timestamp and developed system. finally save all the capture packet in a pcap file format. 114 International Conference on Information and Communication Technology and Its Applications (ICTA 2016) legitimate traffic and it may be DDoS attack. With this, the examiner can then terminate the traffic analyzer to get the save capture file, open it with any pcap reader to check for the MAC address of the suspected IP addresses, all the IP addresses have the same MAC gives proof the evidence that they are all spoof address form a particular source and it is likely to be a DDoS attack. Figure 5. Implementation of Traffic Analyser Figure 7. Detection log from the DDoS attack Figure 6. IP address log This traffic analyzer was use in analyzing internet control message protocol (ICMP) packet which gives every parameter of ICMP packet with their values and displaying the IPv4 header with their necessary information. In a situation whereby the network administrator or whoever is responsible of inspecting the system arrive, all that is needed first is to go to the detection log (figure 6) to check for the IP address log and the respectively timestamp. E. DDoS attack using IP spoofing Figure 8. Graph 0f DD0S This is experiment the attacker’s machine was assigned an IP address of 192.168.1.4 while the victim’s machine was After the DD0S attack was terminated, the save captured assigned an IP address of 10.10.1.10. packet g0tten fr0m this experiment was ana1yse using Hping command tool is also use in performing DDoS statistica1 (IO Graph) in wireshark t0 get the graphica1 attack using spoofed IP source. This command enables the presentati0n 0f the DD0S attack 0n the victim machine. attacker’s machine to send TCP request the victim’s machine Figure 8 disp1ays the graph 0f packet sent 0n the y-axis in which the IP address is spoof in every request that was against x-axis 0f time 1 sec0nd interva1. The b1ack 1ine sent to the victim’s machine. indicate the t0ta1 t0ta1 traffic, red 1ine indicate the tcp reset After this command was launched, the traffic analyzer on whi1e the green 1ine indicate tcp syn. 100king at the figure the victim’s machine start capturing packet coming in and be10w we can deduce that the rate 0f packet that entered the analyzing it second Ethernet frame. victim machine in the first 40 sec0nds rises t0 250 packet per Although traffic analyzer was unable detect the real sec0nd and a1s0 the tcp syn and tcp reset are a1m0st 0n the source IP address of the packet but fortunately because most same range. This means that tcp reset by the attacker’s automated software being used to perform DDoS attack do machine after every tcp synch0nizati0n reset which d0es n0t not spoof the attacker’s MAC address, it only spoofs their IP address which enable traffic analyser to still a lead of who c0nc1ude any successfu1 three way handshake. The has pr00f the attacker’s machine is using the MAC address the traffic is n0t a 1egitimate traffic but rather an i11egitimate The detection log shown in figure 7 also shows the traffic with the characteristics 0f DD0S attack because IP logging of the spoof IP addresses with their respective address are being change after every tcp reset. timestamp. looking at the timestamp, that is, how close a This DD0S attack resu1t in the victim’s machine unab1e request is being sent to the victim before another IP address t0 resp0nd t0 even ping request because 0f the machine will make the examiner suspect that the traffic is not a res0urces has been 0verwhe1med. 115 International Conference on Information and Communication Technology and Its Applications (ICTA 2016) VI. CONCLUSION [8] S. M. Mousavi, “Early Detection of DDoS Attacks in Software Defined Networks Controller Early Detection 0f DDoS Attacks in Development of a traffic analyzer for the detection of Software Defined Networks Controller,” 2014. Distributed Denial of Service attack has been successfully [9] S. Bhatia, “Detecting Distributed Denial-of-Service Attacks and Flash designed, implemented, tested. This new developed system Events.” would help its user to detect anomalous in their production [10] B. Przemyslaw, J. Bartosz, and S. Marcin, “An Entropy-Based network. It will also help network forensic analyst to easily Network Anomaly Detection Method l,” 2015. examine the packet capture from its client network with the [11] M. Kale and D. M. Choudhari, “DDoS Attack Detection Based on an help of the save captured packet and detection log features of Ensemble of Neural Classifier,” vol. 14, no. 7, pp. 122–129, 2014. traffic analyzer. The detection log is always saved as a text [12] D. Yates, “A System for Characterising Internet Background Radiation,” 2014. file which enables an easy disaster recovery of it, in case if the system crashes, because base on experience, text file is [13] I. van Zyl, “Creating a flexible data processing engine for large packet capture datasets,” 2014. easier to recover compare pcap. Therefore, even though both [14] K. M. Prasad, A. R. M. Reddy, and M. G. Karthik, “Flooding attacks the captured packet and the detection was lost in an event of to Internet Threat Monitors ( ITM ): Modeling and Countermeasures disaster, there are still chances of recovery the text file which using Botnet and Honeypots,” J. Comput. Sci., vol. 3, no. 6, pp. 159– can also give us some clue what really happened. 172, 2011. [15] H. Larochelle, Y. Bengio, and P. Lamblin, “Exploring Strategies for REFERENCES Training Deep Neural Networks,” vol. 1, pp. 1–40, 2009. [1] M. S. Asalkar, Sameer A. Bhatnagar, S. Ashish, and A. K. Rahul, [16] G. Shangytbayeva, G. Kazbekova, U. Imanbekova, S. Munsyzbaeva, “Flexible Determinisic Packet Marking : An IP Traceback System To and N. Shangytbayev, “Detecti0n Techniques 0f DoS / DDoS / Find Real Source Of Attack,” 2014. DRDoS Attacks in Networks of Mass Service,” 2015. [2] J. S. Bhatia, R. K. Sehgal, and S. Kumar, “Botnet Command [17] M. Alenezi and M. Reed, “Methodologies for detecting DoS/DDoS Detection using Virtual Honeynet,” vol. 3, no. 5, pp. 177–189, 2011. attacks against network servers,” in Conference on Systems and [3] E. M. Angurala and E. M. Rani, “Design and Develop an Intrusion Networks, 2012, pp. 92–98. Detection System Using Component Based Software Design,” no. [18] Z. M. Mao and O. Spatscheck, “Analyzing large DDoS Attacks Using April, pp. 854–860, 2014. Multiple Data,” in International Conference on large-Scale Attack [4] W. Bhaya and M. E. Manaa, “A Proactive DDoS Attack Detection Defense, 2006, pp. 161–168. Approach Using Data Mining Cluster Analysis,” vol. 5, no. 4, pp. 36– [19] S. Shitharth and D. P. Winston, “A Comparative Analysis between 47, 2014. Two Countermeasure Techniques to Detect DDoS with Sniffers in a [5] Y. Orzach, “Network Forensic with Wireshark,” vol. 3, no. 7, 2014. SCADA Network,” Procedia Technol., vol. 21, pp. l79–l86, 2015. [6] K. M. Prasad, A. R. M. Reddy, and K. V Rao, “DoS and DDoS [20] P. G. Kukreja and D. N. Rewadkar, “Flexible Deterministic Packet Attacks: Defense, Detection and TracebackMechanisms -A Survey,” Market : An IP Traceback Scheme,” vol. 40, no. 1, p. l595–l60l, 2015. Glob. J. Comput. Sci. Technol., vol. 14, no. 7, 2014. [7] N. E. W. Features, “CISC0 4240 INTRUSI0N PREVENTI0N SENS0R, (2682), l4,” 2004. 116