2020 Joint International Conference on Digital Arts, Media and Technology With ECTI Northern Section Conference on Electrical, 2020
DOI: 10.1109/ectidamtncon48261.2020.9090760
|View full text |Cite
|
Sign up to set email alerts
|

A Combination of ICMP and ARP for DHCP Malicious Attack Identification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 6 publications
0
3
0
2
Order By: Relevance
“…For example, Girdler et al [23] present an IDPS system that focuses on malicious MAC addresses associated with ARP spoo ing attacks. Yaibuates et al [24] try to identify malicious requests for IP addresses via DHCP, and combine the ICMP and ARP protocols. The paper of Hsu et al [25] suggests a method that uses a range of reverse traceroute data gathered by a remote server to identify the existence of a malicious rogue AP.…”
Section: Malicious Mac Address-related Mechanismsmentioning
confidence: 99%

Automated Wi-Fi intrusion detection tool on 802.11 networks

Dimitris Koutras,
Panos Dimitrellos,
Panayiotis Kotzanikolaou
et al. 2024
ITU J-FET
“…For example, Girdler et al [23] present an IDPS system that focuses on malicious MAC addresses associated with ARP spoo ing attacks. Yaibuates et al [24] try to identify malicious requests for IP addresses via DHCP, and combine the ICMP and ARP protocols. The paper of Hsu et al [25] suggests a method that uses a range of reverse traceroute data gathered by a remote server to identify the existence of a malicious rogue AP.…”
Section: Malicious Mac Address-related Mechanismsmentioning
confidence: 99%

Automated Wi-Fi intrusion detection tool on 802.11 networks

Dimitris Koutras,
Panos Dimitrellos,
Panayiotis Kotzanikolaou
et al. 2024
ITU J-FET
“…Peneliti [16] menggunakan metode deteksi dengan pendekatan berbeda, yaitu dengan memanfaatkan protokol ICMP dan ARP untuk melakukan validasi apakah paket DHCP yang dikirimkan oleh client menuju DHCP server berasal dari client yang sah (legitimate) ataukah dari penyerang (malicious). pada penelitin tersebut digunakan aplikasi simulator Cisco Packet Tracer untuk melakukan simulasi.…”
Section: Tinjauan Pustakaunclassified
“…Peneliti [17] melajutkan penelitian yang telah dilakukan oleh [16] Langkah keenam adalah melakukan analisis terhadap data yang telah dikumpulkan sebelumnya. Secara umum untuk menghitung tingkat akurasi deteksi menggunakan Confusion Matrix [18].…”
Section: Tinjauan Pustakaunclassified
“…Error messages are used to report errors that can occur during data packet delivery. Diagnostics, testing, and other informational purposes are served by informational messages [45], [46], [47], [48], [49], [50], [51]. An attacker can launch different types of ICMP based attacks, including Ping There are some common types of ICMP (Internet Control Message Protocol) based cyber security attacks such as Ping flood attacks [50] and Smurf attacks [40].…”
Section: A Icmp Based Cyber Attacksmentioning
confidence: 99%