ICMP Based Malicious Attack Identification Method for DHCP

被引:0
|
作者
Yaibuates, Mayoon [1 ]
Chaisricharoen, Roungsan [1 ]
机构
[1] Mae Fah Luang Univ, Sch Informat & Technol, Chiangrai, Thailand
来源
2014 FOURTH JOINT INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONIC AND ELECTRICAL ENGINEERING (JICTEE 2014) | 2014年
关键词
component; DHCP Stavation Attack; DHCP Security; ICMP Protocol; Network Security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
DHCP starvation attack is one of problems that has occured over the network communication. A number of researches have been proposed to solve this problem. However, traditional solutions had some limitation which can lead to denial of service to legitimate users. This paper proposed the solution for detecting the abnormal DHCPREQUEST originated by malicious users in a period of time in order to prevent denial of service to normal users. The detection criteria are based on identifying the validity of the requester using ICMP echo service. The result of this study revealed that the detection accuracy was greater than existing techniques.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Escape method of malicious traffic based on backdoor attack
    Ma B.
    Guo Y.
    Ma J.
    Zhang Q.
    Fang C.
    Tongxin Xuebao/Journal on Communications, 2024, 45 (04): : 73 - 83
  • [2] Malicious ICMP tunneling:: Defense against the vulnerability
    Singh, A
    Nordström, O
    Lu, CH
    dos Santos, ALM
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 226 - 236
  • [3] Adaptive unknown input observer-based detection and identification method for intelligent transportation under malicious attack
    Cheng, PengFei
    Pan, Jinyan
    Zhang, Yi
    MEASUREMENT & CONTROL, 2023, 56 (7-8): : 1377 - 1386
  • [4] Research of malicious code attack effect based on synthetic entropy method
    Li, P. (lipeng@njupt.edu.cn), 1600, Chinese Institute of Electronics (22):
  • [5] Research of Malicious Code Attack Effect Based on Synthetic Entropy Method
    Li Peng
    Wang Ruchuan
    CHINESE JOURNAL OF ELECTRONICS, 2013, 22 (03): : 449 - 454
  • [6] Identification method for malicious traffic in industrial Internet under new unknown attack scenarios
    Zeng F.
    Man D.
    Xu C.
    Han S.
    Wang H.
    Zhou X.
    Li X.
    Yang W.
    Tongxin Xuebao/Journal on Communications, 2024, 45 (06): : 75 - 86
  • [7] Mitigation of DHCP starvation attack
    Mukhtar, Husameldin
    Salah, Khaled
    Iraqi, Youssef
    COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (05) : 1115 - 1128
  • [8] Malicious Websites Identification Based on Active-Passive Method
    Zou, Xue-qiang
    Zhang, Peng
    Huang, Cai-yun
    Bao, Xiu-guo
    CYBER SECURITY, CNCERT 2018, 2019, 970 : 109 - 121
  • [9] Support vector machine based ICMP covert channel attack detection
    Sohn, T
    Noh, T
    Moon, J
    COMPUTER NETWORK SECURITY, 2003, 2776 : 461 - 464
  • [10] A New Attack Method for Malicious Nodes in Tangle Network
    Chen, Fu
    Jia, Huoyu
    Liu, Kun
    Tang, Wenying
    Zhu, Jianming
    Guo, Weiyu
    2020 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD 2020), 2020, : 84 - 87