After two days of hard work, the team led by Jair Santanna (Assistant Professor at University of Twente), won the hackathon on DDoS attacks organized by the Netherlands Internet Exchange (NL-IX), during the Neutral Peering Days, 14 and 15 September 2017, the Hague, the Netherlands.
The team created an integrated solution that automatically identifies multi-vector DDoS attacks and generates patterns for each attack vector. Besides, the solution provides a visualization of the overall network traffic and the attack vectors (on-the-fly). Finally, the solution automatically creates rules to filter each (identified) attack vector using Software Defined Network (SDN) technology. The solution was successfully tested against actual DDoS attacks, re-played at the infrastructure provided by NL-IX.
The team was composed by:
- Jair Santanna (https://www.linkedin.com/in/jjcsantanna): responsible for generating patterns of attacks for each identified attack vector, using python script;
- Jan Harm Kuipers (https://www.linkedin.com/in/jan-harm-kuipers-413aa8114): responsible for the integration of modules, using REDIX;
- Azqa Nadeem (https://www.linkedin.com/in/azqanadeem) and Harikrishnan Manikandan (https://www.linkedin.com/in/harikrishnan-manikandan): responsible for visualizing time series of each attack vector;
- Stavros Konstantaras (https://www.linkedin.com/in/stavros-konstantaras-4b6ba154) and Bart Myszkowski: responsible for automatically generate firewall filters, using the SDN infrastructure provided.
The team thanks to Jan Paul Dekker (CTO at NL-ix) as the mind behind all the hackathon; to Pim van Stam and Gerald Schaapman (from NBIP) for the initial source code of the (single vector) DDoS attack labeling; to Anna Kocks (from Red Dress Effect) for the enthusiasm and support; and to the awesome guys from Severius that were able to create a great infrastructure to (re)play DDoS attacks.
For more information, please contact Jair Santanna (firstname.lastname@example.org)