126 Hits in 4.9 sec

Network attacks: Taxonomy, tools and systems

N. Hoque, Monowar H. Bhuyan, R.C. Baishya, D.K. Bhattacharyya, J.K. Kalita
2014 Journal of Network and Computer Applications  
Based on the behavior and possible impact or severity of damages, attacks are categorized into a number of distinct classes.  ...  This paper also presents a comprehensive and structured survey of existing tools and systems that can support both attackers and network defenders.  ...  For example, network anomalies cause service degradation and impact on network speed, as a result of which, network performance may suffer considerably.  ... 
doi:10.1016/j.jnca.2013.08.001 fatcat:gfvxtbbki5c7xis2wjaj37izsm

A Comprehensive Study on Intrusion and Extrusion Phenomena

Md. Abdul Hamid, Marjia Akter, M. F. Mridha, Muhammad Mostafa Monowar, Madini O. Alassafi
2021 International Journal of Advanced Computer Science and Applications  
The worst case can be N-packets of ACK-storm DoS attack may consume the overall bandwidth of a network.  ...  Therefore, security is the remarkable issue at the core of developing a boundless, constant and reliable web.  ...  As time passes, a scenario with a relatively novel phenomena emerges, and network defenses are inadequate.  ... 
doi:10.14569/ijacsa.2021.0120899 fatcat:5kanmwdbhzfx7lldjmaqd3glgi

Impact of denial of service solutions on network quality of service

Scott Fowler, Sherali Zeadally, Naveen Chilamkurti
2010 Security and Communication Networks  
In this paper we survey techniques and solutions that have been deployed to thwart DoS and DDoS attacks and we evaluate them in terms of their impact on network QoS for Internet services.  ...  Several networks have witnessed Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks over the past few years which have disrupted QoS of network services, thereby violating the Service  ...  ACKNOWLEDGEMENTS We thank the anonymous reviewers for their constructive suggestions that helped us to improve the quality of the paper.  ... 
doi:10.1002/sec.219 fatcat:z2wlcvykd5grlduivnshnrxzbu

Practical verification of WPA-TKIP vulnerabilities

Mathy Vanhoef, Frank Piessens
2013 Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13  
The second attack demonstrates how fragmentation of 802.11 frames can be used to inject an arbitrary amount of packets, and we show that this can be used to perform a portscan on any client.  ...  The first attack is a Denial of Service attack that can be executed by injecting only two frames every minute.  ...  ACKNOWLEDGEMENTS The authors would like to thank the anonymous reviewers and the shepherd for their valuable feedback. This research is partially funded by the Research Fund  ... 
doi:10.1145/2484313.2484368 dblp:conf/ccs/VanhoefP13 fatcat:gxn7sf7nzfe4lcqtih5mz4ohmm

Survey and Taxonomy of Adversarial Reconnaissance Techniques [article]

Shanto Roy, Nazia Sharmin, Jaime C. Acosta, Christopher Kiekintveld, Aron Laszka
2022 arXiv   pre-print
This paper provides a comprehensive view of adversarial reconnaissance that can help in understanding and modeling this complex but vital aspect of cyber attacks as well as insights that can improve defensive  ...  Then, we provide a taxonomy and detailed overview of adversarial reconnaissance techniques.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation or the Army Research  ... 
arXiv:2105.04749v2 fatcat:e4gjpwl4preudpl3odnlg4uta4

Attack Graph-based Moving Target Defense in Software-Defined Networks

Seunghyun Yoon, Jin-Hee Cho, Dong Seong Kim, Terrence J. Moore, Frederica Free-Nelson, Hyuk Lim
2020 IEEE Transactions on Network and Service Management  
hosts in a given network, and determining the frequency of shuffling the hosts' network configurations.  ...  We validated the out performance of the proposed MTD in attack success probability and MTD cost via both simulation and real SDN testbed experiments.  ...  These attacks exploit various control packets such as ARP and ICMP packets for SDN network probing and reconstruct the flow rules in the victim network.  ... 
doi:10.1109/tnsm.2020.2987085 fatcat:7tkadnepzjeznh4nxiwv62wdqm

Survey and Taxonomy of Adversarial Reconnaissance Techniques

Shanto Roy, Nazia Sharmin, Jaime C. Acosta, Christopher Kiekintveld, Aron Laszka
2022 ACM Computing Surveys  
This paper provides a comprehensive view of adversarial reconnaissance that can help in understanding and modeling this complex but vital aspect of cyber attacks as well as insights that can improve defensive  ...  Then, we provide a taxonomy and detailed overview of adversarial reconnaissance techniques.  ...  Adversaries can perform scanning (e.g., TCP, UDP, or ICMP scans) and sniing (often with the help of, e.g., MAC looding or ARP spooing) techniques in a network remotely.  ... 
doi:10.1145/3538704 fatcat:qmztzvltubblxpm5oar7oxpsuy

Multiattribute SCADA-Specific Intrusion Detection System for Power Networks

Y. Yang, K. McLaughlin, S. Sezer, T. Littler, E. G. Im, B. Pranggono, H. F. Wang
2014 IEEE Transactions on Power Delivery  
In this context a novel SCADA-IDS with both whitelists and behaviour-based SCADA protocol analysis is proposed and exemplified in order to detect known and unknown cyber attacks from inside or outside  ...  group of cyber systems connected by one or more internal or external networks using suitable security policies and techniques in order to minimise the attack surface and its impact.  ... 
doi:10.1109/tpwrd.2014.2300099 fatcat:ainkf6o25jbl7lkv462x5e7e7m

Security Threats and Artificial Intelligence based Countermeasures for Internet of Things Networks: A Comprehensive Survey

Shakila Zaman, Khaled Alhazmi, Mohammed Aseeri, Muhammad Raisuddin Ahmed, Risala Tasin Khan, M. Shamim Kaiser, Mufti Mahmud
2021 IEEE Access  
Abeshu and Chilamkurti [132] addressed the impact of ransomware malware, fake ICMP flooding, and DDoS attack on small fog nodes capable of blocking data, reducing transmission rate, or crashing the fog  ...  [127] developed an attack model using a Mirai malware sample that is launched into a weak Small office / Home Office (SOHO) network to investigate the efficiency of the proposed attack detection model  ...  This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see  ... 
doi:10.1109/access.2021.3089681 fatcat:fatpywnjzzfilidakyduz6qz44

On the Design and Use of Internet Sinks for Network Abuse Monitoring [chapter]

Vinod Yegneswaran, Paul Barford, Dave Plonka
2004 Lecture Notes in Computer Science  
We report performance results of our iSink implementation in both controlled laboratory experiments and from a case study of a live deployment.  ...  Monitoring unused or dark IP addresses offers opportunities to significantly improve and expand knowledge of abuse activity without many of the problems associated with typical network intrusion detection  ...  Acknowledgements The authors would like to thank Jeff Bartig, Geoff Horne, Bill Jensen and Jim Martin for all of their help.  ... 
doi:10.1007/978-3-540-30143-1_8 fatcat:iubfxvjebnaqtayuhsafvsop3a

A stealth monitoring mechanism for cyber-physical systems

Vitor Graveto, Luís Rosa, Tiago Cruz, Paulo Simões
2019 International Journal of Critical Infrastructure Protection  
In this paper we propose a novel approach for stealth monitoring of those control devices, for purposes of security and safety management.  ...  observation of both physical inputs/outputs (i.e. the physical processes under control) and network communication flows -allowing the exploitation of various novel monitoring approaches able to address  ...  thorugh probing and exception interception Level Class Impact Attack examples Layer 2/3 Scanning/ Scouting Getting information about network topology and devices ARP or LLDP queries can  ... 
doi:10.1016/j.ijcip.2018.10.006 fatcat:qw27k7lgfrdsvc6g5la3qwsg4q

Towards Learning-automation IoT Attack Detection through Reinforcement Learning [article]

Tianbo Gu, Allaukik Abhishek, Hao Fu, Huanle Zhang, Debraj Basu, Prasant Mohapatra
2020 arXiv   pre-print
As a massive number of the Internet of Things (IoT) devices are deployed, the security and privacy issues in IoT arouse more and more attention.  ...  We conduct extensive experiments over a real IoT attack dataset and demonstrate the effectiveness of our IoT attack detection framework.  ...  (a) shows the distribution of packets for protocols (ARP, DNS, ICMP, TCP, and TLSv1) with and without attacks. The attacks include ARP spoof, TCP SYN, and Smurf.  ... 
arXiv:2006.15826v1 fatcat:ehoeil3vvzc6hmxoqp5y2iun24

A Survey on DDoS Attack and Defense Strategies: From Traditional Schemes to Current Techniques

Muhammad AAMIR, Mustafa Ali ZAIDI
2013 Interdisciplinary Information Sciences  
Moreover, based on the data rate of attack traffic in a given network, the attacks are also categorized as high rate and low rate DDoS attacks [4] .  ...  A form of DoS attack in WLAN [130]. AAMIR and ZAIDI  ...  ICMP Flood Attack Network (Bandwidth) Limited bandwidth Heavy traffic (ICMP Packets) of 'Ping' requests is sent towards a machine on target network.  ... 
doi:10.4036/iis.2013.173 fatcat:pgvcutvfajejpmgatezon5ftdq

A Pragmatic Methodology for Testing Intrusion Prevention Systems

Z. Chen, A. Delis, P. Wei
2008 Computer journal  
Intrusion Prevention Systems (IPSs) not only attempt to detect attacks but also block malicious traffic and pro-actively tear down pertinent network connections.  ...  To effectively thwart attacks, IPSs have to operate both in real-time and inline fashion. This dual mode renders the design/implementation and more importantly the testing of IPSs a challenge.  ...  We are also indebted to Minya Chen and Shiyan Hu for discussions on algorithmic aspects and to Joe Zhu, Hong Huang, Ping Wu, and Chi Zhang of Fortinet for providing traffic traces and many comments on  ... 
doi:10.1093/comjnl/bxn043 fatcat:7tmncabizjfblgiiy7ujoye7tu

Covert channels in TCP/IP protocol stack - extended version-

Aleksandra Mileva, Boris Panajotov
2014 Open Computer Science  
AbstractWe give a survey of different techniques for hiding data in several protocols from the TCP/IP protocol stack. Techniques are organized according to affected layer and protocol.  ...  For most of the covert channels its data bandwidth is given.  ...  Many network covert channels are identified and detected. This is a continuous race between hackers and security experts. Surveys of this type are necessary for following trends in this field.  ... 
doi:10.2478/s13537-014-0205-6 fatcat:tkkyehibpbf3tl5x5bctsqkk6y
« Previous Showing results 1 — 15 out of 126 results