ICMP Based Malicious Attack Identification Method for DHCP

被引:0
|
作者
Yaibuates, Mayoon [1 ]
Chaisricharoen, Roungsan [1 ]
机构
[1] Mae Fah Luang Univ, Sch Informat & Technol, Chiangrai, Thailand
来源
2014 FOURTH JOINT INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONIC AND ELECTRICAL ENGINEERING (JICTEE 2014) | 2014年
关键词
component; DHCP Stavation Attack; DHCP Security; ICMP Protocol; Network Security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
DHCP starvation attack is one of problems that has occured over the network communication. A number of researches have been proposed to solve this problem. However, traditional solutions had some limitation which can lead to denial of service to legitimate users. This paper proposed the solution for detecting the abnormal DHCPREQUEST originated by malicious users in a period of time in order to prevent denial of service to normal users. The detection criteria are based on identifying the validity of the requester using ICMP echo service. The result of this study revealed that the detection accuracy was greater than existing techniques.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Selection of Malicious Attack Nodes for Complex Networks Based on Structural Controllability
    Chen, Shiyu
    Wu, Hao
    Zhang, Ya
    2022 IEEE 17TH INTERNATIONAL CONFERENCE ON CONTROL & AUTOMATION, ICCA, 2022, : 636 - 641
  • [42] Digital Image Watermarking for Malicious Attack
    Lin, Wei-Hung
    Wang, Yuh-Rau
    Horng, Shi-Jinn
    Kao, Tzong-Wann
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PROCEEDINGS, 2009, 5574 : 234 - +
  • [43] ICMP based IP traceback with negligible overhead for highly distributed reflector attack using bloom filters
    Saurabh, S.
    Sairam, A. S.
    COMPUTER COMMUNICATIONS, 2014, 42 : 60 - 69
  • [44] Large scale DNA identification: The ICMP experience
    Parsons, Thomas J.
    Huel, Rene M. L.
    Bajunovic, Zlatan
    Rizvic, Adnan
    FORENSIC SCIENCE INTERNATIONAL-GENETICS, 2019, 38 : 236 - 244
  • [45] Defeat Magic with Magic: A Novel Ransomware Attack Method to Dynamically Generate Malicious Payloads Based on PLC Control Logic
    Zhang, Yipeng
    Li, Min
    Zhang, Xiaoming
    He, Yueying
    Li, Zhoujun
    APPLIED SCIENCES-BASEL, 2022, 12 (17):
  • [46] Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement
    Yao Z.
    Zhu Z.
    Ye G.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (08): : 103 - 110
  • [47] Identification of malicious code variants based on image visualization
    Naeem, Hamad
    Guo, Bing
    Naeem, Muhammad Rashid
    Ullah, Farhan
    Aldabbas, Hamza
    Javed, Muhammad Sufyan
    COMPUTERS & ELECTRICAL ENGINEERING, 2019, 76 : 225 - 237
  • [48] DDoS Attack Identification and Defense using SDN based on Machine Learning Method
    Yang Lingfeng
    Zhao Hui
    2018 15TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS AND NETWORKS (I-SPAN 2018), 2018, : 166 - 170
  • [49] A Malicious URL Detection Method Based on CNN
    Chen, Yu
    Zhou, Yajian
    Dong, Qingqing
    Li, Qi
    2020 IEEE CONFERENCE ON TELECOMMUNICATIONS, OPTICS AND COMPUTER SCIENCE (TOCS), 2020, : 23 - 28
  • [50] Person Re-identification Method Based on Color Attack and Joint Defence
    Gong, Yunpeng
    Huang, Liqing
    Chen, Lifei
    2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS, CVPRW 2022, 2022, : 4312 - 4321