z-logo
open-access-imgOpen Access
Amplification-based Attack Models for Discontinuance of Conventional Network Transmissions
Author(s) -
Mina Malekzadeh,
Moghis Ashrostaghi,
M. H. Shahrokh Abadi
Publication year - 2015
Publication title -
international journal of information engineering and electronic business
Language(s) - English
Resource type - Journals
eISSN - 2074-9023
pISSN - 2074-9031
DOI - 10.5815/ijieeb.2015.06.03
Subject(s) - computer science , denial of service attack , network packet , computer security , computer network , rendering (computer graphics) , wireless network , wireless , telecommunications , the internet , computer graphics (images) , world wide web
Amplification attacks take advantage of insecurity of different OSI layers. By targeting broadcast address of the victim networks and sending a few packets by the attackers, they force the legitimate user in the victim networks to response to these packets and attack their own trusted networks unknowingly. Despite importance of amplification attacks, there is not any work to implement these attacks to identify their procedure and quantify and compare their impacts on the networks. In this work, we use NS2 to achieve these goals. A variety range of scenarios are designed to implement DDoS amplification attacks and collect the results in terms of different network performance measures. The quantitative results prove devastating impact of the attacks which are easily capable of rendering the target wireless networks disable for their legitimate users.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom