{"title":"Neutralizing City's Cyber Infrastructure through the launch of Second Wave SYN-Flood Attacks","authors":"Caleb Lipan, T. Mantoro, M. A. Ayu","doi":"10.1109/ICCED56140.2022.10010671","DOIUrl":null,"url":null,"abstract":"\"Si vis pacem, para bellum\", a Latin adage translated as \"if you want peace, prepare for war\". In a world with a rapid technological pace, every country must therefore be prepared for any potential wars and attacks, including cyber warfare. As seen in the Yugoslav Wars in the late 20th century and the recent Russo-Ukrainian conflict, the destruction of cyber infrastructure and massive disinformation campaigns can be decisive factors in favoring one side over the other. The destruction of Iranian nuclear infrastructures by Stuxnet in 2010 is a major warning to all cybersecurity experts. Any carelessness or failure in implementing cybersecurity methods can be destructive. To better prepare for any future conflict, this paper proposes the improvement of existing methods of SYN-flood attacks by the use of camouflage IP addresses. The aim of this student is to provide structured data that can be used as a reference for cybersecurity experts in an event of a cyber-attack or all-out cyber warfare. This research uses Scapy, a packet manipulation program commonly used to launch Denial-of-Service (DOS) attacks. By camouflaging the source IP address, the results show significant improvements in terms of resource usage and the number of packets detected.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCED56140.2022.10010671","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
"Si vis pacem, para bellum", a Latin adage translated as "if you want peace, prepare for war". In a world with a rapid technological pace, every country must therefore be prepared for any potential wars and attacks, including cyber warfare. As seen in the Yugoslav Wars in the late 20th century and the recent Russo-Ukrainian conflict, the destruction of cyber infrastructure and massive disinformation campaigns can be decisive factors in favoring one side over the other. The destruction of Iranian nuclear infrastructures by Stuxnet in 2010 is a major warning to all cybersecurity experts. Any carelessness or failure in implementing cybersecurity methods can be destructive. To better prepare for any future conflict, this paper proposes the improvement of existing methods of SYN-flood attacks by the use of camouflage IP addresses. The aim of this student is to provide structured data that can be used as a reference for cybersecurity experts in an event of a cyber-attack or all-out cyber warfare. This research uses Scapy, a packet manipulation program commonly used to launch Denial-of-Service (DOS) attacks. By camouflaging the source IP address, the results show significant improvements in terms of resource usage and the number of packets detected.
“Si vis pacem, para bellum”,这是一句拉丁谚语,被翻译成“如果你想要和平,就准备战争”。在一个科技发展迅速的世界里,每个国家都必须为任何潜在的战争和攻击做好准备,包括网络战。正如在20世纪末的南斯拉夫战争和最近的俄乌冲突中所看到的那样,网络基础设施的破坏和大规模的虚假宣传活动可能是有利于一方而不是另一方的决定性因素。2010年,Stuxnet对伊朗核设施的破坏给所有网络安全专家敲响了警钟。实施网络安全方法的任何疏忽或失败都可能是破坏性的。为了更好地应对未来的冲突,本文提出了利用伪装IP地址对现有SYN-flood攻击方法进行改进。该学生的目的是提供结构化数据,可以作为网络攻击事件或全面网络战争中网络安全专家的参考。本研究使用Scapy,一个数据包处理程序,通常用于发起拒绝服务(DOS)攻击。通过伪装源IP地址,结果显示在资源使用和检测到的数据包数量方面有显着改善。