{"title":"基于ICMP的DHCP恶意攻击识别方法","authors":"Mayoon Yaibuates, R. Chaisricharoen","doi":"10.1109/JICTEE.2014.6804073","DOIUrl":null,"url":null,"abstract":"DHCP starvation attack is one of problems that has occurred over the network communication. A number of researches have been proposed to solve this problem. However, traditional solutions had some limitation which can lead to denial of service to legitimate users. This paper proposed the solution for detecting the abnormal DHCPREQUEST originated by malicious users in a period of time in order to prevent denial of service to normal users. The detection criteria are based on identifying the validity of the requester using ICMP echo service. The result of this study revealed that the detection accuracy was greater than existing techniques.","PeriodicalId":224049,"journal":{"name":"The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"ICMP based Malicious Attack Identification Method for DHCP\",\"authors\":\"Mayoon Yaibuates, R. Chaisricharoen\",\"doi\":\"10.1109/JICTEE.2014.6804073\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"DHCP starvation attack is one of problems that has occurred over the network communication. A number of researches have been proposed to solve this problem. However, traditional solutions had some limitation which can lead to denial of service to legitimate users. This paper proposed the solution for detecting the abnormal DHCPREQUEST originated by malicious users in a period of time in order to prevent denial of service to normal users. The detection criteria are based on identifying the validity of the requester using ICMP echo service. The result of this study revealed that the detection accuracy was greater than existing techniques.\",\"PeriodicalId\":224049,\"journal\":{\"name\":\"The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-03-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/JICTEE.2014.6804073\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/JICTEE.2014.6804073","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
ICMP based Malicious Attack Identification Method for DHCP
DHCP starvation attack is one of problems that has occurred over the network communication. A number of researches have been proposed to solve this problem. However, traditional solutions had some limitation which can lead to denial of service to legitimate users. This paper proposed the solution for detecting the abnormal DHCPREQUEST originated by malicious users in a period of time in order to prevent denial of service to normal users. The detection criteria are based on identifying the validity of the requester using ICMP echo service. The result of this study revealed that the detection accuracy was greater than existing techniques.