Research Article

A Traffic Cluster Entropy Based Approach to Distinguish DDoS Attacks from Flash Event Using DETER Testbed

Algorithm 1

Topology generation code.
set ns new Simulator
source tb_compat.tcl
#Create the topology nodes
Foreachnode{SR0R1R2R3R4L1L2L3L4L5L6L7L8L9L10L11L12L13L14L15L16
L17L18L19L20L21L22L23L24L25L26L27L28L29L30L31L32L33L34L35L36L37L38
L39L40L41L42L43L44L45L46L47L48L49L50L51L52L53L54L55L56L57L58L59L60
L61L62L63L64L65L66L67L68L69L70L71L72L73L74L75L76L77L78L79L80A1A2A3
A4control}{
#Create new node
set $node $ns node
#Define the OS image
tb-set-node-os set $node FC4-STD
#Have SEER install itself and startup when the node is ready
tb-set-node-startcmd set $node "sudo python/share/seer/v160/experiment-setup.pyBasic"
}
#Create the client networks
setlannet0[$nsmake-lan"$L1$L2$L3$L4$L5$L6$L7$L8$L9$L10$R1"100Mb0ms]
setlannet1[$nsmake-lan"$L11$L12$L13$L14$L15$L16$L17$L18$L19$L20$R1"100Mb0ms]
setlannet2[$nsmake-lan"$L21$L22$L23$L24$L25$L26$L27$L28$L29$L30$R2"100Mb0ms]
setlannet3[$nsmake-lan"$L31$L32$L33$L34$L35$L36$L37$L38$L39$L40$R2"100Mb0ms]
setlannet4[$nsmake-lan"$L41$L42$L43$L44$L45$L46$L47$L48$L49$L50$R3"100Mb0ms]
setlannet5[$nsmake-lan"$L51$L52$L53$L54$L55$L56$L57$L58$L59$L60$R3"100Mb0ms]
setlannet6[$nsmake-lan"$L61$L62$L63$L64$L65$L66$L67$L68$L69$L70$R4"100Mb0ms]
setlannet7[$nsmake-lan"$L71$L72$L73$L74$L75$L76$L77$L78$L79$L80$R4"100Mb0ms]
#CreatetheAttackNodeslinks
setlinkRA1[$nsduplex-link$A1$R1100Mb3msDropTail]
setlinkRA2[$nsduplex-link$A2$R2100Mb3msDropTail]
setlinkRA3[$nsduplex-link$A3$R3100Mb3msDropTail]
setlinkRA4[$nsduplex-link$A4$R4100Mb3msDropTail]
#Createthetopologylinks
setlinkRS[$nsduplex-link$S$R0100Mb3msDropTail]
setlinkRR2[$nsduplex-link$R0$R1100Mb3msDropTail]
setlinkR1R9[$nsduplex-link$R0$R2100Mb3msDropTail]
setlinkR1R10[$nsduplex-link$R0$R3100Mb3msDropTail]
setlinkR1R11[$nsduplex-link$R0$R4100Mb3msDropTail]
$nsrtprotoStatic
$nsrun