Bogdanoski, Mitko and Risteski, Aleksandar (2011) Wireless Network Behavior under ICMP Ping FloodDoS Attack and Mitigation Techniques. International Journal of Communication Networks and Information Security (IJCNIS), 3 (1).
Preview |
Text
__ugd.edu.mk_private_UserFiles_biljana.kosturanova_Desktop_Mitko Bogdanoski - Trudovi za UGD Repozitorium_Telekomunikacii - Kompjuterski Nauki_8. 65-254-1-PB.pdf Download (522kB) | Preview |
Abstract
Internet Control Message Protocol (ICMP) is an error
reporting and diagnostic utility and it is considered as a part of
Internet Protocol (IP) suite. Although this protocol is very
important for ensuring correct data distribution, it can be exploited
by malicious users for conducting different Denial of Service (DoS)
attacks. Due to the broadcast nature of wireless communication,
exploitation of this kind of attack is even easier. By sending bogus
ICMP redirect packets, a malicious user can either disrupt or
intercept communication from a wireless access point.
In this paper, we present our approach to simulate the ICMP
Ping Flood Attack, and to analyze the effects of this attack on
wireless networks using OPNET Modeler. We propose several
countermeasures against this type of attack. Simulation results
regarding the effects of link failure recovery mechanism against this
type of attack are discussed.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | ICMP, Ping Flood, DoS, Failure Recovery |
Subjects: | Natural sciences > Computer and information sciences Engineering and Technology > Electrical engineering, electronic engineering, information engineering Social Sciences > Media and communications |
Divisions: | Military Academy |
Depositing User: | Biljana Kosturanova |
Date Deposited: | 30 May 2013 13:18 |
Last Modified: | 27 Sep 2013 09:06 |
URI: | https://eprints.ugd.edu.mk/id/eprint/6462 |
Actions (login required)
View Item |