2015 23nd Signal Processing and Communications Applications Conference (SIU) 2015
DOI: 10.1109/siu.2015.7130435
|View full text |Cite
|
Sign up to set email alerts
|

Common network attack types and defense mechanisms

Abstract: For every organization having a well secured network is the primary requirement to reach their goals. A network is said to be secure if it can protect itself from sophisticated attacks. Due to the rapid increase in the number of network users, security becomes the main challenge in the area of network field. Most security related threats target the layers of the OSI reference model. Sophisticated attack types such as Distributed Denial of Service (DDoS), Man-in-the-Middle and IP spoofing attacks are used to at… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Bandwidth and resource consumption attacks and application attacks are representative types of DDoS attacks [12], [13]. In bandwidth consumption attacks, the attacker controls many zombie computers that generate a sufficiently large number of packets and to exceed network bandwidth capacity [14]. In particular, bandwidth consumption attacks cause connection failures to other systems in the same network.…”
Section: B Abnormal Behaviormentioning
confidence: 99%
“…Bandwidth and resource consumption attacks and application attacks are representative types of DDoS attacks [12], [13]. In bandwidth consumption attacks, the attacker controls many zombie computers that generate a sufficiently large number of packets and to exceed network bandwidth capacity [14]. In particular, bandwidth consumption attacks cause connection failures to other systems in the same network.…”
Section: B Abnormal Behaviormentioning
confidence: 99%
“…The a ttack doess not increase the bps(bit per seconds), but increases the system overhead due to an increases in pps(packet per second). The SYN flooding attack which depletes a resource usin g SYN packet is belongs to the resource consuming attack [17,18]. In the virtual environment, the attacker can exhaust the bandwidth and the resource of network to paralyze the entire net work.…”
Section: Malicious Behaviormentioning
confidence: 99%