ICMP Based Malicious Attack Identification Method for DHCP

被引:0
|
作者
Yaibuates, Mayoon [1 ]
Chaisricharoen, Roungsan [1 ]
机构
[1] Mae Fah Luang Univ, Sch Informat & Technol, Chiangrai, Thailand
关键词
component; DHCP Stavation Attack; DHCP Security; ICMP Protocol; Network Security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
DHCP starvation attack is one of problems that has occured over the network communication. A number of researches have been proposed to solve this problem. However, traditional solutions had some limitation which can lead to denial of service to legitimate users. This paper proposed the solution for detecting the abnormal DHCPREQUEST originated by malicious users in a period of time in order to prevent denial of service to normal users. The detection criteria are based on identifying the validity of the requester using ICMP echo service. The result of this study revealed that the detection accuracy was greater than existing techniques.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Escape method of malicious traffic based on backdoor attack
    Ma, Bowen
    Guo, Yuanbo
    Ma, Jun
    Zhang, Qi
    Fang, Chen
    [J]. Tongxin Xuebao/Journal on Communications, 2024, 45 (04): : 73 - 83
  • [2] Adaptive unknown input observer-based detection and identification method for intelligent transportation under malicious attack
    Cheng, PengFei
    Pan, Jinyan
    Zhang, Yi
    [J]. MEASUREMENT & CONTROL, 2023, 56 (7-8): : 1377 - 1386
  • [3] Malicious ICMP tunneling:: Defense against the vulnerability
    Singh, A
    Nordström, O
    Lu, CH
    dos Santos, ALM
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 226 - 236
  • [4] Research of malicious code attack effect based on synthetic entropy method
    [J]. Li, P. (lipeng@njupt.edu.cn), 1600, Chinese Institute of Electronics (22):
  • [5] Research of Malicious Code Attack Effect Based on Synthetic Entropy Method
    Li Peng
    Wang Ruchuan
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2013, 22 (03) : 449 - 454
  • [6] Identification method for malicious traffic in industrial Internet under new unknown attack scenarios
    Zeng, Fanyi
    Man, Dapeng
    Xu, Chen
    Han, Shuai
    Wang, Huanran
    Zhou, Xue
    Li, Xinchun
    Yang, Wu
    [J]. Tongxin Xuebao/Journal on Communications, 2024, 45 (06): : 75 - 86
  • [7] Malicious Websites Identification Based on Active-Passive Method
    Zou, Xue-qiang
    Zhang, Peng
    Huang, Cai-yun
    Bao, Xiu-guo
    [J]. CYBER SECURITY, CNCERT 2018, 2019, 970 : 109 - 121
  • [8] Mitigation of DHCP starvation attack
    Mukhtar, Husameldin
    Salah, Khaled
    Iraqi, Youssef
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (05) : 1115 - 1128
  • [9] Support vector machine based ICMP covert channel attack detection
    Sohn, T
    Noh, T
    Moon, J
    [J]. COMPUTER NETWORK SECURITY, 2003, 2776 : 461 - 464
  • [10] A New Attack Method for Malicious Nodes in Tangle Network
    Chen, Fu
    Jia, Huoyu
    Liu, Kun
    Tang, Wenying
    Zhu, Jianming
    Guo, Weiyu
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD 2020), 2020, : 84 - 87