11.07.2015 Views

Denial of Service (DOS) Testing Sample Test Plans - Ixia

Denial of Service (DOS) Testing Sample Test Plans - Ixia

Denial of Service (DOS) Testing Sample Test Plans - Ixia

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Test</strong> Case 2: VoIP andTCP SYN Attacks Copyright © <strong>Ixia</strong>, 2005ObjectiveThis test case will observe what happens ina VoIP environment when a series <strong>of</strong> SYNattacks are directed at a host. It will showhow VoIP connections can be sabotagedwhen the DUT is not configured correctly.MethodologyA communication channel will be set upbetween two sets <strong>of</strong> Performance Endpoints,creating several VoIP conversations. A TCPSYN attack will be launched against one <strong>of</strong>the endpoints from a third location. The DUTwill initially allow the attack to proceed. Inthe second iteration, the DUT will be trainedto disallow any TCP connection attemptsfrom the third party location.Figure 1 will be used to model theattack. The VoIP conversations will existbetween the 172.176.25/24 and the192.168.10/24 networks. Another networkwill be superimposed on the same physicalconnection as the 172.176.25/24 network,utilizing an address from the 123.227.25/24network.Note that IxApplifier will be used to installan address range <strong>of</strong> 172.176.25.101 to172.176.25.120 on the public side <strong>of</strong> theDUT, and address range <strong>of</strong> 192.168.10.101to 192.168.10.120 on the private side. Also,the third party address <strong>of</strong> 123.127.25.100will be installed on the external port. It willtarget address 192.168.10.101 on theinternal port, using the DUT as a gateway ataddress 123.227.25.1.1. Set up VoIP pairs between internaland external clients. The VoIP traffic willtravel in both directions; that is, half <strong>of</strong> theconnections will have Endpoint 1 on theprivate side <strong>of</strong> the DUT, and half will haveEndpoint 1 on the public side. Set up a total<strong>of</strong> 20 pairs. See the setup in Figure 5.. Ensure that the DUT rules enforcement isturned <strong>of</strong>f.3. Set up the attacking port to use ahardware performance pair. Select theIPv4_Syn_Port80_74Bytes.str pattern. Makesure “Measure hardware performance pairstatistics” is left unchecked so that thevictim port (internal port) responds to theattack. Finally, override the stream line rateand set up a very low rate <strong>of</strong> attack. You mayhave to experiment a bit with this number. Agood starting point is 0.01%. The objectiveis to slowly overwhelm the victim port as thetest is underway.4. Set the run time for 1 minute, and runthe test. You should see the MOS scoresregistering an almost perfect performanceup to the point that the victim processorgets overwhelmed with TCP requests. At thatpoint, the MOS scores will cease to exist,indicating that no more data is coming infrom the victim port.5. If the target port did not crash, go back tostep 3 and adjust the stream line rate higher.You should not have to go any higher than5% to see the detrimental results <strong>of</strong> a TCPSYN attack.6. Turn on DUT rule enforcement. Thereare several things that can be done to theDUT, depending on the sophistication <strong>of</strong> thefiltering required. If the DUT terminates andproxies TCP connections, then you couldturn on TCP SYN-Cookies to stop the effects<strong>of</strong> the SYN attack. The simplest method isto simply filter on the malicious address,123.227.25.100. This may not be practicalin the real world, but it can demonstrate theDUT’s ability to filter on undesirable sourceaddresses.7. Run the test again and ensure that theMOS scores stay at their near-perfect levelsthroughout the test.<strong>Denial</strong> <strong>of</strong> <strong>Service</strong> (<strong>DOS</strong>) <strong><strong>Test</strong>ing</strong>: <strong>Sample</strong> <strong>Test</strong> <strong>Plans</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!