WS-Attacker DOS-Extension Helpfile
This document provides a fast overview of how to read the results.
If you have any questions regarding the tool in general or certain functions, feel free to contact: andreas.falkenberg@rub.de
Attack Success Metric
The definition of a successful DOS attack depends on the goal of the attacker.
In Order to consider different attacker goals, 2 different attack success parameters are defined:
-
1. Attack roundtrip time ratio
Defined as: ( median of response time of the last 10 tampered request ) / ( median of response time of the last 10 untampered requests )
The higher the ratio the higher the attack impact.
E.g. A ratio of 4 points indicates that the roundtrip time of the tampered request is 4 times higher than the roundtrip time of an untampered request.
The following threshold values are set:
< 3 points: |
attack ineffective |
>= 3 points and < 6 points: |
attack effective |
>= 6 points: |
attack highly effective |
-
2. Testprobe roundtrip time after attack
Defined as: ( request size of testprobe request ) / ( request size of tampered request )
ddd
< 2 seconds: |
no or small impact on 3rd party users |
>= 2 seconds and < 5 seconds: |
third party users are affected |
>= 5 seconds: |
third party users are heavily affected |
Attack Graph explained
The result GUI is supposed to be read in the following way
- Green Bar: Number of untampered requests send in interval
- Red Bar: Number of tampered requests send in interval
- Green Line: roundtrip time of untampered requests
- Red Line: roundtrip time of tampered requests
- Blue Line: roundtrip time of testprobe requests
Simulates third party users.
If more than one request got send within an interval,
the mean value of all requests that got send within that interval is calculated.
Architecture of the DoS extension
The following process takes place once an attack was started.
The attack parameters can be set during attack configuration.