Improved Technique of IP Address Fragmentation Strategies for DoS Attack Traceback

Author(s):  
Byung-Ryong Kim ◽  
Ki-Chang Kim
2019 ◽  
Vol 4 (12) ◽  
pp. 65-70
Author(s):  
Md. Mustafejur Rahman ◽  
Md. Mustafizur Rahman ◽  
Saif Ibne Reza ◽  
Sumonto Sarker ◽  
Md. Mehedi Islam

Duplicate Address Detection (DAD) is one of the most interesting features in IPv6. It allows nodes to connect to a network by generating a unique IP address. It works on two Neighbor Discovery (ND) messages, namely, Neighbor Solicitation (NS) and Neighbor Advertisement (NA). To verify the uniqueness of generating IP, it sends that IP address via NS message to existing hosts. Any malicious node can receive NS message and can send a spoof reply, thereby initiates a DoS attack and prevents auto configuration process. In this manner, DAD is vulnerable to such DoS attack. This study aims to prevent those malicious nodes from sending spoof reply by securing both NS and NA messages. The proposed Advanced Bits Security (ABS) technique is based on Blake2 algorithm and introducing a creative option called ABS field that holds the hash value of tentative IP address and attached to both NA and NS message. We expect the ABS technique can prevent spoof reply during DAD procedure in link local network and can prevent DoS attack


2019 ◽  
Vol 125 ◽  
pp. 21004
Author(s):  
Kagiraneza Alexis Fidele ◽  
Agus Hartanto

Nowadays, we are entering an era where the internet has become a necessary infrastructure and support that can be applied as a means of regular communication and data service. In these services, cloud-based on servers has an essential role as it can serve numerous types of devices that are interconnected with several protocols. Unfortunately, internet cloud servers become the main target of attacks such as Denial of Service (DoS), Distributed Denial of Service (DDoS). These attacks have illegal access that could interfere in service functions. Sniffing techniques are typically practiced by hackers and crackers to tap data that passes through the internet network. In this paper, sniffing technique aims to identify packets that are moving across the network. This technique will distinguish packet on the routers or bridges through a sniffer tool known as snort connected to a database containing the attack pattern. If the sniffing system encounters strange patterns and recognizes them as attacks, it will notify to the firewall to separate the attacker's original Internet Protocol (IP) address. Then, communication from the attacker's host to the target will be discontinued. Consequently, the identified attack activity will stop working, and the service will proceed to run.


2020 ◽  
Vol 1 (2) ◽  
pp. 63-72
Author(s):  
I Putu Agus Eka Pratama

TCP SYN Flood as one kind of Denial of Service (DoS) attack, still popular to flood the server connection, by sending SYN packets to the target. Because of the risk caused by this attack, there is a need for a network security mechanism. In this paper, one of the security mechanisms proposed is using Stateful Packet Inspection (SPI) method on Configserver Security and Firewall (CSF). By using SPI method, CSF has capabilities to responsible for separating packets of data, that may be entered with data packets that should not be entered into the server. For example: port to be opened, port closed, and IP Address that may access the server for anywhere. This paper combines both of CSF and SPI method to prevent TCP SYN Flood (DoS) with Proof of Concept (PoC) at the Linux operating system. The security process is done in 3 ways: configuring a maximum connection from an IP Address to a server, securing an incoming SYN packet per second, and counting how many times an IP Address violates the minimum SYN packet rule per second before being blocked by a firewall.


1970 ◽  
Vol 23 (03) ◽  
pp. 601-620 ◽  
Author(s):  
Th. B Tschopp

SummaryAggregation of cat platelets in the citrated plasma is examined by means of Born’s absorptiometer. A marked tendency of the platelets of this species to spontaneous aggregation necessitated first of all the development of an improved technique of blood collection.A hypothesis according to which 5-HT is released from the platelets, explains the absence of oscillations on the base line of the absorptiometer, the absence of platelet swelling, when ADP is added, and the effect of stirring on the aggregation curves in cat PRP. The average volume of cat platelets amounts to 10.46 μ3 when directly fixed in the blood, when fixed from PRP to 12.17 μ3, when fixed from stirred PRP to 13.51 μ3.In low concentrations (0.3-2 μM) ADP produce reversible aggregation; in narrowly restricted, individually dissimilar mean concentrations irreversible aggregation in two phases and in high concentrations, irreversible aggregation in one phase. Like ADP serotonin produces 2 phase irreversible aggregation in concentrations of 3-10 μM, but unlike ADP, the aggregation velocity decreases again with high 5-HT concentrations (>100 μM). Adrenaline does not produce aggregation and it is likely that adenosine and adenosine monophosphate inhibit the aggregation by serotonin but not by ADP. Species differences in the aggregation of human, rabbit and cat platelets are discussed.


2012 ◽  
Vol 21 (03) ◽  
pp. 176-180 ◽  
Author(s):  
Sameh Aknoukh Labib ◽  
Albert Martin Pendleton
Keyword(s):  

2012 ◽  
Vol 15 (2-3) ◽  
pp. 127-139
Author(s):  
Tung Tran Anh ◽  
Laurent Berquez ◽  
Laurent Boudou ◽  
Juan Martinez-Vega ◽  
Alain Lacarnoy

2016 ◽  
Vol 1 (1) ◽  
pp. 001
Author(s):  
Harry Setya Hadi

String searching is a common process in the processes that made the computer because the text is the main form of data storage. Boyer-Moore is the search string from right to left is considered the most efficient methods in practice, and matching string from the specified direction specifically an algorithm that has the best results theoretically. A system that is connected to a computer network that literally pick a web server that is accessed by multiple users in different parts of both good and bad aim. Any activity performed by the user, will be stored in Web server logs. With a log report contained in the web server can help a web server administrator to search the web request error. Web server log is a record of the activities of a web site that contains the data associated with the IP address, time of access, the page is opened, activities, and access methods. The amount of data contained in the resulting log is a log shed useful information.


Sign in / Sign up

Export Citation Format

Share Document