Comparative Analysis of CPU Performance on FreeBSD 64-bit and RedHat 64-bit Operating System Against Denial of Service (DoS) Using Hping3
DOI:
https://doi.org/10.24114/cess.v8i1.42824Keywords:
denial of services attacks, hping3 tools, operating system performance analysisAbstract
Denial of Services (Dos) attack is a type of attack against server traffic. DoS works by placing a heavy load on the server, so that the server cannot accommodate connections from other users and can cause system failure on the server. On the other hand, Denial of Services (DoS) attacks can be used to test server resilience. The servers to be tested are using RedHat Linux and FreeBSD operating systems. Testing is carried out by flooding the system with DoS attacks using the hping3 tool, then comparing the test results in the form of percentages of CPU consumption and memory consumption between operating systems to determine vulnerabilities in each operating system. Based on a comparison of test results between operating systems, the FreeBSD operating system has better CPU performance than the RedHat Linux operating system, but has a vulnerability in internal memory to DoS attacks. Meanwhile, the RedHat Linux operating system has better internal memory performance than the FreeBSD operating system, but has a vulnerability in CPU performance against DoS attacks.References
Zeng, K., Chen, Y., Cho, H., Xing, X., Doupé, A., Shoshitaishvili, Y., & Bao, T., 2022. Understanding and Improving Linux Kernel Exploit Reliability. USENIX, p.2.
Islam, MM., Shahid, S., Awar, KB., Khan, R., & Sohail, M., 2021. Cyber Security: Dos Attack Outcomes are Dangerous. European Journal of Electrical Engineering and Computer Science, p.2.
Malallah, HF., Zeebaree, SRM., Zebari, RR., Sadeeq, MAM., Ageed, ZS., Ibrahim, IM., Yasin, HM., & Merceedi, KJ., 2021. A Comprehensive Study of Kernel (Issues and Concepts) in Different Operating Systems. Asian Journal of Computer Science and Information Technology, p.2.
Widharma, IGS., 2020. Instruction Set dalam Ilmu Komputer.https://www.researchgate.net/publication/346510287, p.10.
Cetinkaya, A., Ishii, Hideaki., & Hayakawa, T., 2019. An Overview on Denial of Service Attacks in Control Systems: Attack Models and Security Analyses. Multidisciplinary Digital Publishing Institute, p.1-2.
Mishra, SB. & Alok, S., 2017. Handbook of Research Methodology. https://www.researchgate.net/publication/319207471, p.1-3.
Stiawan, D., Idris, MY., & Abdullah, AH., 2015. Penetration Testing and Network Auditing: Linux. Journal of Information Processing System, p.1.
Chen, Y & Zhu, A., 2014. The Design and Implementation of Firewall Based on FreeBSD. Institute of Electrical and Electronic Engineering, p.1.
Stiawan, D., Idris, MY., & Abdullah, AH., 2013. Attack and Vulnerability Penetration Testing: FreeBSD. Telkomnika, p.8.
Scarfone, K., Souppaya, M., Cody, A., & Orebaugh, A. 2008. Technical Guide to Information Security Testing and Assessment. National Institute of Standards and Technology, p.5.
Sow, D., Bulut, MF., Adam, C., Bedell, C., Ocepek, S., Ngweta, L. 2017. Attack Techniques and Threat Identification for Vulnerabilities. Association for Computing Machinery, p.2.
Elleithy, KM., Blagovic, D., Cheng, WK., Sideleau, P. 2005. Denial of Services Attack Techniques: Analysis, Implementation and Comparison. Journal of Systemics, Cybernetics, and Informatics, p.1.
Zeebaree, SRM., Jacksi, K., Zebari, RR. 2020. Impact Analysis of SYN Flood DDoS Attack on HAProxy and NLB Cluster-Based Web Servers. Indonesian Journal of Electrical Engineering and Computer Science, p.3.
Liang, X., Znati., T. 2019. An Empirical Study of Intelligent Approaches to DDoS Detection in Large Scale Networks. International Conference on Computing, Networking, and Communications (ICNC): Network Algorithms and Performance Evaluation, p1.
Matsubara, K., Takagawa, Y. 2020. Adaptive OS Switching for Improving Availability During Web Traffic Surges: A Feasibility Study. IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), p.1.
Kaluarachchilage, PKH., Attanayake, C., Rajasooriya, S., Tsokos, CP. 2020. An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems. Moderns Education and Computer Science (MECS), p.3.
Venter, HS., Eloff, HP. 2004. Vulnerability Forecasting “ a Conseptual Model. Computers & Security, 23, p.489-497.
Ruohone, J., Hyrynsalmi, S., Leppanen, V. 2015. The Sigmoidal Growth of Operating System Security Vulnerabilities: an Empirical Revisit. Computers & Security, 55, p.1-20.
Johnson, P., Gorton, D., Lagerström, R., Ekstedt, M. 2016. Time Beetwen Vulnerability Disclosures: a Measure of Software Product Vulnerability. Computers & Security, 62, p.278-295.
Downloads
Published
Issue
Section
License
Copyright (c) 2023 CESS (Journal of Computer Engineering, System and Science)

This work is licensed under a Creative Commons Attribution 4.0 International License.