Application of IP Network Modeling Platforms for Cyber-Attack Research

被引:0
|
作者
Nedyalkov, Ivan [1 ]
Georgiev, Georgi [1 ]
机构
[1] SouthWest Univ Neofit Rilski, 66 Ivan Mihailov Str, Blagoevgrad 2700, Bulgaria
来源
FOURTH CONGRESS ON INTELLIGENT SYSTEMS, VOL 1, CIS 2023 | 2024年 / 868卷
关键词
Asterisk; Cyber-attacks; DoS attack; GNS3; IP modeling; Kali Linux; Traffic characterization; VoIP;
D O I
10.1007/978-981-99-9037-5_18
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This work proposes the use of IP network modeling platforms to study cyber-attacks. For the purpose of this work, the GNS3 platform is proposed to be used due to the range of advantages and functionalities it offers. In this work, a model of an IP network is created in which voice streams are exchanged (VoIP connections are established) between users. Kali Linux is used as the attacker because of its capabilities and tools it offers. The device under attack is the Asterisk Free PBX. It is subjected to various TCP flood attacks (TCP SYN, TCP FIN, and TCP RST). The goal is to check how Asterisk reacts when using the different TCP flood attacks and in which attack, the consequences will be the most severe. Ports 80 and 5060 are under attack. A characterization of the traffic and studying of the impact of the applied cyber-attacks on the exchanged voice streams during the attacks are done. Well-known traffic monitoring and delay measurement tools were used during the study.
引用
收藏
页码:229 / 245
页数:17
相关论文
共 50 条
  • [1] Adaptive cyber-attack modeling system
    Gonsalves, Paul G.
    Dougherty, Edward T.
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C31)TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE V, 2006, 6201
  • [2] Cyber-Attack Modeling Analysis Techniques: An Overview
    AL-Mohannadi, Hamad
    Mirza, Qublai
    Namanya, Anitta
    Awan, Irfan
    Cullen, Andrea
    Disso, Jules
    2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, : 69 - 76
  • [3] Cyber-Attack Attributes
    Kadivar, Mehdi
    TECHNOLOGY INNOVATION MANAGEMENT REVIEW, 2014, : 22 - 27
  • [4] The Law of Cyber-Attack
    Hathaway, Oona A.
    Crootof, Rebecca
    Levitz, Philip
    Nix, Haley
    Nowlan, Aileen
    Perdue, William
    Spiegel, Julia
    CALIFORNIA LAW REVIEW, 2012, 100 (04) : 817 - 885
  • [5] Cyber-attack group analysis method based on association of cyber-attack information
    Son, Kyung-ho
    Kim, Byung-ik
    Lee, Tae-jin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 260 - 280
  • [6] Application of Artificial Neural Network for Cyber-Attack Detection in Water Distribution Systems as Cyber Physical Systems
    Min, Kyoung Won
    Choi, Young Hwan
    Al-Shamiri, Abobakr Khalil
    Kim, Joong Hoon
    ADVANCES IN HARMONY SEARCH, SOFT COMPUTING AND APPLICATIONS, 2020, 1063 : 82 - 88
  • [7] The Research on Cyber-Attack Testbed With Hardware-In-Loop
    Fei, Jiaxuan
    Liu, Zengji
    Ma, Yuanyuan
    Huang, Xiuli
    Wang, Qi
    Tang, Yi
    2017 IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2), 2017,
  • [8] A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection
    Dutta, Vibekananda
    Choras, Michal
    Pawlicki, Marek
    Kozik, Rafal
    SENSORS, 2020, 20 (16) : 1 - 20
  • [9] Support Vector Machine for Network Intrusion and Cyber-Attack Detection
    Ghanem, Kinan
    Aparicio-Navarro, Francisco J.
    Kyriakopoulos, Konstantinos G.
    Lambotharan, Sangarapillai
    Chambers, Jonathon A.
    2017 SENSOR SIGNAL PROCESSING FOR DEFENCE CONFERENCE (SSPD), 2017, : 79 - 83
  • [10] Optimization of Cyber-Attack Detection Using the Deep Learning Network
    Van Duong, Lai
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (07): : 159 - 163