Created by: Jelena Mirkovic, USC/ISI,
Updated for CS 356 Fall 2017 by: Indrajit Ray, CSU
*Extended Due Date*: Thursday, Nov 9, 2017 9:30 am via CANVAS
  1. Overview
  2. Required Reading
  3. Introduction
  4. Assignment Instructions
    1. Setup
    2. Tasks
      1. Generating legitimate traffic
      2. Turning off SYN cookies
      3. Generating attack traffic
      4. Collecting statistics
    3. What Can Go Wrong
  5. Extra Credit
  6. Submission Instructions


This exercise demonstrates a well-known denial-of-service attack, called TCP SYN flood. Students will be able to create a real attack using DETER tools, and to observe its effect on legitimate traffic. Afterwards, they will be asked to apply a known defense against SYN flood known as SYN cookies, repeat the attack and observe the protection.

This exercise helps students learn the following concepts: (1) How TCP/IP works and how its design can be misused for attacks, (2) How easy it is to perpetrate a DoS attack, with fully legitimate traffic and at a low rate, (3) How easy it is to protect machines from this type of attacks via built-in OS mechanisms. Additionally, extra credit questions improve a student's understanding of how networks and TCP/IP work.

Required Reading

All students should have completed an introductory networking course with grade B or better.


Denial of service attacks deny service to legitimate clients by tying up resources at the server with a flood of legiitmate-looking service requests or junk traffic. Before proceeding to the assignment instructions make sure that you understand how TCP SYN flood attack works, which resource it ties up and how, and how syncookies help mitigate this attack.

Assignment Instructions


Each student should load the topology file /share/education/TCPSYNFlood_USC_ISI/synflood.ns into the DETER testbed to create a new experiment. Do not modify the topology file but read it through and identify what each directive does. Once an experiment is swapped in, install Apache on the server node by typing on server node:
Similarly, install an attack tool called "flooder" on the attacker node by typing on attacker node:


Generating legitimate traffic

Create a Web traffic stream between the client and the server nodes by writing a script at the client that each second gets index.html from the server. You can for example write this script using bash and curl.

Turning off SYN cookies

SYN cookies are often on by default in Linux and FreeBSD. To check if they are on do the following:
  ssh server.YourExperiment.YourProject
  sudo sysctl net.ipv4.tcp_syncookies
If you see 1 as the result, SYN cookies must be set to zero for the demo to work. Type the following on the server machine:
sudo sysctl -w net.ipv4.tcp_syncookies=0
Verify that SYN cookies are now off by typing on the server machine:
  sudo sysctl net.ipv4.tcp_syncookies

Generating attack traffic

Create a SYN flood between the attacker and the server nodes, using the Flooder tool. You can type "flooder" on the attacker node's command line to get a man page for the tool. Examples at this page show how to write a command to send a flood of SYN packets. Make sure to spoof within range (use mask

Collecting statistics

You will now collect tcpdump statistics on client machine with and without syncookies, calculate connection duration and draw graphs of connection duration on y-axis and connection start time on x-axis. Perform the following steps:
  1. Stop all traffic by stopping your legitimate client's script and flooder.
  2. Start tcpdump on the client
      ssh client.YourExperiment.YourProject
      ip route get
    You should see something like this as a result:
   via dev eth2  src
               cache  mtu 1500 advmss 1460 metric 10 64
    Thus the interface name leading to is eth2. To see the traffic flowing type:
      sudo tcpdump -nn -i eth2 
    then generate some traffic, restart your client. You will need to discover proper tcpdump options to see only IP traffic and to save recorded traffic into a file. Start tcpdump with these options.
  3. Using a stopwatch perform the following scenario:
    1. Start legitimate traffic
    2. After 30 seconds start the attack
    3. After 120 seconds stop the attack
    4. After 30 seconds stop the legitimate traffic
    5. Stop the tcpdump on the client and save the file
  4. Turn the SYN cookies on and repeat the above steps.
  5. Using the recorded traffic files and tcpdump to read them, process the output and calculate connection duration for each TCP connection seen in the files. Connection duration is the difference between the time of the first SYN and of the ACK following a FIN-ACK (or between the first SYN and the first RESET) on a connection. Recall what uniquely identifies a TCP connection, i.e. how to detect packets that belong to the same connection? If a connection did not end with a FIN or a RST, assign to it the duration of 200 s.

What can go wrong

Extra Credit

There are two extra-credit questions:
  1. Remove spoofing from the attack. Repeat the exercise without SYN cookies and observe and explain the effect. What happens? Can you explain why this happens? For hints run a tcpdump on the server node and look for traffic patterns. Can you modify the attack so that it is effective without spoofing and how would you do this?
  2. Modify the NS file to introduce point-to-point routes, using the Modify Experiment option. Hint, you need to remove the server's route to lan1 and to add routes from the server to the attacker, and from the server to the client. Then click on Submit. It will take several minutes for the experiment to be restarted and you will receive an email notification once this is done. Now repeat the exercise without SYN cookies and observe and explain the effect. What happens? Can you explain why this happens? For hints run a tcpdump on the server node and look for traffic patterns.

Submission Instructions

You should submit a Word document with the following items (label each section):
  1. Explanation how the TCP SYN flood attack works.
  2. Explanation how SYN cookies work to prevent denial-of-service effect from SYN flood attack
  3. Your legitimate client script
  4. Your attack command (for flooder)
  5. The connecton duration graphs you drew in task 5 (one with SYN cookies, one without SYN cookies). Indicate on the graphs using vertical lines or arrows the start and the end of the attack.
  6. Explanation what happens in each case. Is the attack effective? How can you tell this from the graphs?
  7. Answers to extra credit questions if any.