ICMP Based Malicious Attack Identification Method for DHCP

被引:0
|
作者
Yaibuates, Mayoon [1 ]
Chaisricharoen, Roungsan [1 ]
机构
[1] Mae Fah Luang Univ, Sch Informat & Technol, Chiangrai, Thailand
来源
2014 FOURTH JOINT INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONIC AND ELECTRICAL ENGINEERING (JICTEE 2014) | 2014年
关键词
component; DHCP Stavation Attack; DHCP Security; ICMP Protocol; Network Security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
DHCP starvation attack is one of problems that has occured over the network communication. A number of researches have been proposed to solve this problem. However, traditional solutions had some limitation which can lead to denial of service to legitimate users. This paper proposed the solution for detecting the abnormal DHCPREQUEST originated by malicious users in a period of time in order to prevent denial of service to normal users. The detection criteria are based on identifying the validity of the requester using ICMP echo service. The result of this study revealed that the detection accuracy was greater than existing techniques.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Security analysis of SDN controller-based DHCP services and attack mitigation with DHCPguard
    Tok, Mevlut Serkan
    Demirci, Mehmet
    COMPUTERS & SECURITY, 2021, 109
  • [32] A TARGETED ADVERSARIAL ATTACK METHOD FOR MULTI-CLASSIFICATION MALICIOUS TRAFFIC DETECTION
    Sun, Peishuai
    Si, Chengxiang
    Li, Shuhao
    Cheng, Zhenyu
    Zhao, Shuyuan
    Liu, Qingyun
    2024 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, ICASSP 2024, 2024, : 4765 - 4769
  • [33] IMDRPL: Identifying and eliminating malicious devices using DIO and DAO ICMP control messages in RPL-based protocol
    P. Deepavathi
    C. Mala
    Peer-to-Peer Networking and Applications, 2023, 16 : 2380 - 2398
  • [34] A Combinatorial Optimization Analysis Method for Detecting Malicious Industrial Internet Attack Behaviors
    Zhao, Kejing
    Zhang, Zhiyong
    Choo, Kim-Kwang Raymond
    Zhang, Zhongya
    Zhang, Tiantian
    ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2024, 8 (01)
  • [35] Bilinear Dynamical Networks Under Malicious Attack: An Efficient Edge Protection Method
    de Oliveira, Arthur Castello B.
    Siami, Milad
    Sontag, Eduardo D.
    2021 AMERICAN CONTROL CONFERENCE (ACC), 2021, : 1210 - 1215
  • [36] Malicious attack detection based on traffic-flow information fusion
    Chen, Ye
    Lai, Yingxu
    Zhang, Zhaoyi
    Li, Hanmei
    Wang, Yuhang
    2022 IFIP NETWORKING CONFERENCE (IFIP NETWORKING), 2022,
  • [37] Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack
    Lee, Kyungroul
    Lee, Jaehyuk
    Yim, Kangbin
    APPLIED SCIENCES-BASEL, 2023, 13 (05):
  • [38] Identification Method of Power Internet Attack Information Based on Machine Learning
    Niu, Yitong
    Andrei, Korneev
    Iraqi Journal for Computer Science and Mathematics, 2022, 3 (02): : 1 - 8
  • [39] IMDRPL: Identifying and eliminating malicious devices using DIO and DAO ICMP control messages in RPL-based protocol
    Deepavathi, P.
    Mala, C.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (05) : 2380 - 2398
  • [40] A closer look into DHCP starvation attack in wireless networks
    Hubballi, Neminath
    Tripathi, Nikhil
    COMPUTERS & SECURITY, 2017, 65 : 387 - 404