Network Analysis of ICMP Ping Flood DoS Attack in WiMAX and Wireless LAN
Sharing of data over the wireless network is an important activity in today’s world. A malicious user may try blocking a service or intercept data. Such attacks on network are termed as denial-of-service attack. Due to the broadcast nature of wireless com
- PDF / 546,053 Bytes
- 9 Pages / 439.37 x 666.142 pts Page_size
- 42 Downloads / 224 Views
Abstract Sharing of data over the wireless network is an important activity in today’s world. A malicious user may try blocking a service or intercept data. Such attacks on network are termed as denial-of-service attack. Due to the broadcast nature of wireless communication, exploitation of this kind of attack is even easier. That is why, security is a very critical issue in e-business. It is often impossible to measure its effectiveness in real life because of the network administrators’ fears or prejudice. But before measuring its effectiveness and developing mitigation methods, it is important to understand the how such attacks actually works and we should have full knowledge about their characteristics and their impacts. In this paper, we present our approach to simulate the ICMP Ping Flood attack in WiMax and wireless LAN and to analyze the effects of this attack on wireless networks using OPNET Modeler. Keywords Wireless
Malicious ICMP WiMAX Wi-Fi
1 Introduction E-business like online shopping, bank transaction requires the exchanging of secret information. Malicious user may try attack these organization sites. Such attacks are denial-of-service attack. A denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended users. Preventing or mitigating DoS attacks is not an easy job. First, we have to understand how the attacks work. DoS attacks can be classified by many criteria. Basically, there are two methods of attacking. One method is Vulnerability (Semantic): Vulnerability A. Raheja (&) A. Singh Computer Engineering, TIT&S, Bhiwani, Haryana, India e-mail: [email protected] A. Singh e-mail: [email protected] © Springer Science+Business Media Singapore 2016 S.C. Satapathy et al. (eds.), Proceedings of International Conference on ICT for Sustainable Development, Advances in Intelligent Systems and Computing 409, DOI 10.1007/978-981-10-0135-2_10
109
110
A. Raheja and A. Singh
attacks exploit a specific feature or an implementation bug of some protocol or of an application installed at the victim in order to consume excess amounts of its resources. The other method is Flooding (Brute-force): Flooding attacks are performed by initiating a vast amount of seemingly legitimate transactions. The common targets are web servers, DNS look up servers, and interconnecting devices.
2 Previous Work A lot of research has been done in the field of Denial-of-service Attack. Zaballos [1] presented his views as network security nowadays has become important for both network implementation and design. Due to this, the need of making secure communications over the network has increased at the same pace as the accessibility to services of Internet. Although security is a delicate issue in e-business, but it may be impossible to measure its effectiveness in real life because of the network administrators’ fears. To find a solution to this particular problem, once more simulation opens the way to solve the problems that are difficult to fix in real life. Elleithy [2] atta
Data Loading...