The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICT 2014
DOI: 10.1109/jictee.2014.6804073
|View full text |Cite
|
Sign up to set email alerts
|

ICMP based Malicious Attack Identification Method for DHCP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
2

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 5 publications
0
5
0
2
Order By: Relevance
“…This packet will appear to be a legitimate control message; hence the routing change it contains will be accepted. If the target host makes this change to its global routing tables, rather than just to the per-connection cached route, the intruder may proceed with spoofing [107] host T. Some hosts do not perform enough validity checks on ICMP Redirect messages; in such cases, the impact of this attack becomes similar to RIP-based attacks [108], [109]. ICMP may also be used for targeted denial of service attacks.…”
Section: Internet Control Message Protocol (Icmp)mentioning
confidence: 99%
“…This packet will appear to be a legitimate control message; hence the routing change it contains will be accepted. If the target host makes this change to its global routing tables, rather than just to the per-connection cached route, the intruder may proceed with spoofing [107] host T. Some hosts do not perform enough validity checks on ICMP Redirect messages; in such cases, the impact of this attack becomes similar to RIP-based attacks [108], [109]. ICMP may also be used for targeted denial of service attacks.…”
Section: Internet Control Message Protocol (Icmp)mentioning
confidence: 99%
“…The paper suggests the malicious software identification system dependent on API calls that are introduced in applications [1]. A modern malware-detection system is also available based on synchronization with several series API calls [3]. This system is comprehensive and incorporated in applications.…”
Section: Literature Surveymentioning
confidence: 99%
“…However, attackers still have consumed all allocated IP addresses to each port and move to another port by switching to other Wireless Access Point [23]. A method for detecting and recovering malicious IP address request by using ICMP protocol has been proposed [3][4]. These methods can use to detect and recover IP address from the malicious request accurately in spite of the fact that the ICMP based could not detect the malicious request and recover the IP address hold by attackers faster than the attack rate.…”
Section: Non-cryptology Basedmentioning
confidence: 99%
“…ICMP protocol has been introduced as a method to successfully detect and recover the IP addresses that was hold by the attackers in a scenario study [3][4]. The speed of detecting and recovering still has been challenged for practical implementation.…”
Section: Introductionmentioning
confidence: 99%