ICMP Based Malicious Attack Identification Method for DHCP

被引:0
|
作者
Yaibuates, Mayoon [1 ]
Chaisricharoen, Roungsan [1 ]
机构
[1] Mae Fah Luang Univ, Sch Informat & Technol, Chiangrai, Thailand
来源
2014 FOURTH JOINT INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONIC AND ELECTRICAL ENGINEERING (JICTEE 2014) | 2014年
关键词
component; DHCP Stavation Attack; DHCP Security; ICMP Protocol; Network Security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
DHCP starvation attack is one of problems that has occured over the network communication. A number of researches have been proposed to solve this problem. However, traditional solutions had some limitation which can lead to denial of service to legitimate users. This paper proposed the solution for detecting the abnormal DHCPREQUEST originated by malicious users in a period of time in order to prevent denial of service to normal users. The detection criteria are based on identifying the validity of the requester using ICMP echo service. The result of this study revealed that the detection accuracy was greater than existing techniques.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] An identification method of malicious nodes in wireless communication based on dynamic reputation algorithm
    Chen J.
    International Journal of Information and Communication Technology, 2021, 19 (04) : 343 - 355
  • [22] Behavior-Based Detection for Malicious Script-Based Attack
    Yoon, Soojin
    Choo, Hyun-lock
    Bae, Hanchul
    Kim, Hwankuk
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 97 - 103
  • [23] K-core-based attack to the internet: Is it more malicious than degree-based attack?
    Zhao, Jichang
    Wu, Junjie
    Chen, Mingming
    Fang, Zhiwen
    Zhang, Xu
    Xu, Ke
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2015, 18 (03): : 749 - 766
  • [24] K-core-based attack to the internet: Is it more malicious than degree-based attack?
    Jichang Zhao
    Junjie Wu
    Mingming Chen
    Zhiwen Fang
    Xu Zhang
    Ke Xu
    World Wide Web, 2015, 18 : 749 - 766
  • [25] Malicious Attack Detection Method for Recommendation Systems Based on Meta-pseudo Labels and Dynamic Features
    Liu, Hui
    Ji, Ke
    Chen, Zhenxiang
    Ma, Kun
    Zhao, Xiaofan
    WEB AND BIG DATA, APWEB-WAIM 2024, PT IV, 2024, 14964 : 379 - 393
  • [26] Identification method of attack path based on immune intrusion detection
    Wenhua, Huang
    Geng, Yishuang
    Journal of Networks, 2014, 9 (04) : 964 - 971
  • [27] Research on attack identification method and device method based on random forest algorithm
    Electric Power Research Institute, China Southern Power Grid, Guangzhou
    51000, China
    不详
    51000, China
    不详
    518000, China
    不详
    518000, China
    J. Phys. Conf. Ser., 1
  • [28] Network Malicious Traffic Identification Method Based on CWGAN-GP Category Balancing
    Ding, Yaojun
    Wang, Anzhou
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2022, 51 (05): : 760 - 765
  • [29] Exploiting DHCP Server-side IP Address Conflict Detection: A DHCP Starvation Attack
    Tripathi, Nikhil
    Hubballi, Neminath
    2015 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNCATIONS SYSTEMS (ANTS), 2015,
  • [30] Accurate ICMP traceback model under DoS/DDoS attack
    Izaddoost, Alireza
    Othman, Mohamed
    Rasid, Mohd Fadlee A.
    ADCOM 2007: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2007, : 441 - +