Assessment of High and Low Rate Protocol-based Attacks on Ethernet Networks
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 7
Abstract
The Internet and Web have significantly transformed the world’s communication system. The capability of the Internet to instantly access information at anytime from anywhere has brought benefit for a wide variety of areas including business, government, education, institutions, medical, and entertainment services. However, the Internet has also opened up the possibilities for hackers to exploit flaws and limitations in the target networks to attack and break in without gaining physical access to the target systems. The OSI layer protocol-based attacks are among them. In this work we investigate feasibility as well as severity of the attacks against three common layering protocols including TCP, UDP, and ICMP on Ethernet-based networks in the real world through a testbed. Then a simulation environment is designed to implement the exact same attacks under similar conditions using NS2 network simulator. The testbed results and simulation results are compared with each other to explore the accuracy of the findings and measure the damages the attacks caused to the network.
Authors and Affiliations
Mina Malekzadeh, M. A. Beiruti, M. H. Abadi
Bio-Inspired Clustering of Complex Products Structure based on DSM
Clustering plays an important role in the decomposition of complex products structure. Different clustering algorithms may achieve different effects of the decomposition. This paper aims to proposes a bio-inspired geneti...
Performance Evaluation of Mesh-Based Multicast Routing Protocols in MaNETs
Multicasting is a challenging task that facilitates group communication among the nodes using the most efficient strategy to deliver the messages over each link of the network. In spite of significant research achievemen...
Standard Intensity Deviation Approach based Clipped Sub Image Histogram Equalization Algorithm for Image Enhancement
The limitations of the hardware and dynamic range of digital camera have created the demand for post processing software tool to improve image quality. Image enhancement is a technique that helps to improve finer details...
Validating a Novel Conflict Resolution Strategy Selection Method (ConfRSSM) Via Multi-Agent Simulation
Selecting a suitable conflict resolution strategy when conflicts appear in multi-agent environments is a hard problem. There is a need to develop a method that can select a suitable strategy which guaranties low cost in...
A New Approach for Improvement Security against DoS Attacks in Vehicular Ad-hoc Network
Vehicular Ad-Hoc Networks (VANET) are a proper subset of mobile wireless networks, where nodes are revulsive, the vehicles are armed with special electronic devices on the motherboard OBU (On Board Unit) which enables th...