Wireless Network Behavior under ICMP Ping FloodDoS Attack and Mitigation Techniques

Bogdanoski, Mitko and Risteski, Aleksandar (2011) Wireless Network Behavior under ICMP Ping FloodDoS Attack and Mitigation Techniques. International Journal of Communication Networks and Information Security (IJCNIS), 3 (1).

__ugd.edu.mk_private_UserFiles_biljana.kosturanova_Desktop_Mitko Bogdanoski - Trudovi za UGD Repozitorium_Telekomunikacii - Kompjuterski Nauki_8. 65-254-1-PB.pdf

Download (510Kb) | Preview


Internet Control Message Protocol (ICMP) is an error reporting and diagnostic utility and it is considered as a part of Internet Protocol (IP) suite. Although this protocol is very important for ensuring correct data distribution, it can be exploited by malicious users for conducting different Denial of Service (DoS) attacks. Due to the broadcast nature of wireless communication, exploitation of this kind of attack is even easier. By sending bogus ICMP redirect packets, a malicious user can either disrupt or intercept communication from a wireless access point. In this paper, we present our approach to simulate the ICMP Ping Flood Attack, and to analyze the effects of this attack on wireless networks using OPNET Modeler. We propose several countermeasures against this type of attack. Simulation results regarding the effects of link failure recovery mechanism against this type of attack are discussed.

Item Type: Article
Uncontrolled Keywords: ICMP, Ping Flood, DoS, Failure Recovery
Subjects: Natural sciences > Computer and information sciences
Engineering and Technology > Electrical engineering, electronic engineering, information engineering
Social Sciences > Media and communications
Divisions: Military Academy
Depositing User: Biljana Kosturanova
Date Deposited: 30 May 2013 13:18
Last Modified: 27 Sep 2013 09:06
URI: http://eprints.ugd.edu.mk/id/eprint/6462

Actions (login required)

View Item View Item