2019
DOI: 10.26438/ijcse/v7i4.248258
|View full text |Cite
|
Sign up to set email alerts
|

Mitigation of DoS and Port Scan Attacks Using Snort

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…"The Ping of Death sends fragmented ICMP Echo Requests that, once reassembled, are larger than the maximum size of an IP packet more than the specified IP limit (65536 bytes) are sent to the victim machine hence making it to hang, reboot or crash" [12].…”
Section: Ping Of Deathmentioning
confidence: 99%
“…"The Ping of Death sends fragmented ICMP Echo Requests that, once reassembled, are larger than the maximum size of an IP packet more than the specified IP limit (65536 bytes) are sent to the victim machine hence making it to hang, reboot or crash" [12].…”
Section: Ping Of Deathmentioning
confidence: 99%
“…Rules and ird Party Rules. At last, we evaluated the performance of our newly generated rules compared with other rules for detecting Dos/DDos attacks in [69,70]. In Reference [69], because the rules for detecting Dos attacks mainly used the existing keywords which belong to the type of Nonpayload Detection Rule Options in Snort, we called them the "Nonpayload Option Rules," denoted as NP.…”
Section: Performance Comparison Between Our Newly Generatedmentioning
confidence: 99%
“…In Reference [69], because the rules for detecting Dos attacks mainly used the existing keywords which belong to the type of Nonpayload Detection Rule Options in Snort, we called them the "Nonpayload Option Rules," denoted as NP. In Reference [70], the rules mainly used the existing keyword, detection_filter, which belongs to the type of Post-Detection Rule Options in Snort, to describe the high frequency characteristics of Dos/DDos attacks. erefore, we called them the "Post-Detection Option Rules," denoted as PD.…”
Section: Performance Comparison Between Our Newly Generatedmentioning
confidence: 99%
See 1 more Smart Citation
“…For all experiments we verify that the threats correctly traverse the safeguards. We validate the threats we produced using Snort [17], [46], [29]. Snort is a powerful open source network intrusion detection system, capable of performing real time traffic analysis and packet logging on IP networks.…”
Section: Validationmentioning
confidence: 99%