scholarly journals Attempt TCP ACK-Storm Based Virtual Network Attacks and Defence Solutions

Author(s):  
Tran Namm Khanh ◽  
Ta Minh Thanh

Abstract The rapid development of the digital age has been pushing people to access a mobile working environment when handsets are becoming more diverse and convenient with the help of Virtualization Technology. The speed and usability of Virtualization Technology are astounding for saving initial investment costs and optimizing IT infrastructure. Such Virtualization Technology is what businesses are interested in and makes the virtual server market growing strongly, especially for businesses that have many branches. However, virtual systems (hypervisors) are more vulnerable than traditional servers according due to many network attacks from curious users. Therefore, it's necessary to prepare for the worst circumstances, understand clearly, and research for new threats that can break down the virtual system. In this paper, we attempt to demonstrate the TCP ACK storm based DoS (Denial of Service) attack on virtual and Docker networks to show the threats that easily are happen on services deploying on virtual networks. Based on such consequence, we propose some solutions to prevent our virtual system from potential risks.

Author(s):  
Chen Yue ◽  
Lu Tianliang ◽  
Cai Manchun ◽  
Li Jingying

There are a lot of uncertainties and incomplete information problems on network attack. It is of great value to access the effect of the attack in the current network attack and defense. This paper examines the characteristics of network attacks, there are problems with traditional clustering that index attribution is not clear and the cross of clustering interval. A two-stage grey synthetic clustering evaluation model based on center-point triangular whitenization weight function was proposed for the attack effect. The authors studied the feasibility of applying this model to the evaluation of network attack effect. Finally, an example is given, which showed the model could evaluate the effect of the denial-of-service attack precisely. It is also shown that the model is viable to evaluate the attack effect.


2012 ◽  
Vol 468-471 ◽  
pp. 2002-2009
Author(s):  
Yan Hua Wang ◽  
Xiu Xu

Denial of Service Attack is a very important security event in the current network security .Address the problem of DDoS Network Attacks ,researchers have proposed a variety of tracking programs against Denial of Service Attack .Such as IP tracking program, packet marking ,logging ,connection test ,ICMP tracking ,covering networks ,and so on .The marked storage space has been expended by the use of authentication machnism of adaptive probability packet .Increasing marks could store the hash value of the IP addresses of the head node .With the selection of the mentioned two methods above ,the quantity of needed packet while reconstructing the path has been decreased .And ultimately ,the propose of decreasing the rate of false positives and the computational complexity ,as well as improving the convergence and security have been reached.


2018 ◽  
Vol 10 (1) ◽  
pp. 92-100 ◽  
Author(s):  
Chen Yue ◽  
Lu Tianliang ◽  
Cai Manchun ◽  
Li Jingying

There are a lot of uncertainties and incomplete information problems on network attack. It is of great value to access the effect of the attack in the current network attack and defense. This paper examines the characteristics of network attacks, there are problems with traditional clustering that index attribution is not clear and the cross of clustering interval. A two-stage grey synthetic clustering evaluation model based on center-point triangular whitenization weight function was proposed for the attack effect. The authors studied the feasibility of applying this model to the evaluation of network attack effect. Finally, an example is given, which showed the model could evaluate the effect of the denial-of-service attack precisely. It is also shown that the model is viable to evaluate the attack effect.


2005 ◽  
Vol 9 (4) ◽  
pp. 363-365 ◽  
Author(s):  
A. Shevtekar ◽  
K. Anantharam ◽  
N. Ansari

Sign in / Sign up

Export Citation Format

Share Document