Preview

An Analysis of Current Computer Network Attack Procedures, Their Mitigation Measures and the Development of an Improved Denial of Service (Dos) Attack Model

Powerful Essays
Open Document
Open Document
8128 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
An Analysis of Current Computer Network Attack Procedures, Their Mitigation Measures and the Development of an Improved Denial of Service (Dos) Attack Model
AN ANALYSIS OF CURRENT
COMPUTER NETWORK ATTACK
PROCEDURES, THEIR MITIGATION
MEASURES AND THE DEVELOPMENT
OF AN IMPROVED DENIAL OF
SERVICE (DoS) ATTACK MODEL
IHEKWEABA OGECHI, INYIAMA H.C, IHEKWEABA CHUKWUGOZIEM
ABSTRACT - This paper presents the major network attack profiles, taxonomies, classification and identification frameworks.
Further, current approaches for intrusion detection on networks were x-rayed though, with emphasis on
Denial of Service (DoS) attacks only.
The concept of intelligent agents and subsequently adaptive systems was elucidated, the properties derived were used as a proof of concept, and then applied in the development of a model for an adaptive intelligent multi-agent for network protection, against denial of service attacks.
KEYWORDS: Agent, Denial of Service attack, Dynamic Host Configuration Protocol, Transmission
Control Protocol, / Internet Protocol
1.0 INTRODUCTION
As the world has moved further into information – driven global economy, the value of information, and controlled access to that information, has never been greater [1]. The goal of IT infrastructure therefore is to create systems that can detect and protect against unauthorized access while providing timely access to legitimate users. Today’s network must be able to respond to attacks in ways that maintain network availability and reliability and allow a business to continue to function. In many respects, the goal of security is to make networks more resilient by making them more flexible. Rather than succumb, networks must be able to absorb attacks and remain operational, much in the same way the human immune system allows us to keep functioning in the presence of viruses and related bacterial infections.
The future of security technology has changed more in the last three years than it did in the prior ten years [2].
The extent of these changes, as well as the rate of changes, has made it difficult for security IT departments to keep up with



References: [3] Todd Lammle, “ Cisco Certified Network Associate Study Guide Sixth Edition”. Chapter 10 page 611 -613, 2007. [13] Genge Box, Gwilyn Jenkins, and Gregory Reinsel, “Time series analysis forecasting and control”. Prentice-Hall, New york, NY, 1986. [14] Ronald Bracewell, “The Fourier Transform and Its Applications”. Series in electrical engineering. Mc Graw Hill. New York NY, 1986 [15] H. Debar, M. Becker, and D. Sibon, “A neural network component for an intrusion detection system”. In proceeding of the IEEE computer society symposium on research in Security and privacy, 1992. [16] S. Kumar and E.H. Spafford, “An application of pattern matching in intrusion detection”. In technical report CSDTR-94-013, Purdue university, 1994. [17] K. Ghosh, “Learning program behaviour profiles for intrusion detection”. In proceedings of the 1st USENIX workshop on intrusion detection and network monitoring, 1991. [20] R. Agrawal, T. Imielinski, and A. Swami, “Mining association rules between set of items in large database”. In proceeding of the 1993 international conference on management of Data (SIGMOD93), ACM press, vol(22) issue 2, 1993, page 207-216. [21] W. Lee, and S. Stolfo “Data mining approaches for intrusion detection”. In proceeding of the 7th USENIX security symposium, 1998. [23] http://www.sans.org/resources/idfaq/hostbase.php.online article (last accessed: July 06 2006). [31] R. Oliveira, “Network management with knowledge of Requirement: Use of software Agents”. PhD thesis, 1998. [32] M. Wooldridge and N. R. Jennirys “Intelligent Agents: Theory and practice”. Knowledge Engineering Review, 1995. [34] J. P.Muller,” The Design of intelligent Agents- A layered approach”. LNA1 state-of-the art survey, springer, Berlin, Germany, 1996. [35] M. Asaka, S. Okasa wa, A. Taguchi, and S. “ A method of tracing intruders by use of mobile agents”. In INET’99, 1999. [37] M.C. Bernades and E. Dos Santos Mareira. Implementation of an intrusion detection system based in mobile agents. In international symposium on software engineering for parallel and distributed system, 2000. Technical report, university of Minnesota, 2002. [40] A.Rao and M.Geogeff, “BDI agent: from theory of practice technical note, 1991. [44] Neil’s Ferguson, Bruce Schenier, “Practice cryptogram”, Wiley publishing, Inc. 2003. [48] Ari Juels and John Brainerd, “Client puzzle: Cryptographic defense against connection depletion attacks”. In S.Kent, editor, proceedings of NDSS, as, 1999. [52] Jocobson, I, Booch, G. and J. Rumbanyh, “The Unified Software Development Process, Addison –Wesley, 1999.

You May Also Find These Documents Helpful

  • Best Essays

    Trulove, J. (2005). “Designing LAN Wiring Systems.” LAN wiring (3rd ed.). McGraw-Hill Professional. P. 23. ISBN 0-07-145975-8.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    An automated response approach, in contrast, provides immediate response to detected incidents without human intervention. An automated response essentially addresses the shortcomings of a notification and manual response approach by mitigating the vulnerability between detecting and responding. Although notification and manual responses are inadequate due to its inability to address attacks in real time, there are still drawbacks for the automated response approach. The complications prevalent to the automated response approach includes false…

    • 107 Words
    • 1 Page
    Good Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    We show how incremental deployment of such routers can make the Internet safer. Like all things dynamic, change is inevitable. Such is the case with your network environment. Upgrades and modifications to the network architecture can sometimes expose, or create security holes. Hardening a network does not always mean spending large amounts of money. Whether that means spending it on new hardware, software, or man hours really depends on what needs to be addressed. It may include all of the above. The time may come when a cost/benefit analysis will be required by those in charge before hardening activities can move forward. As such it's important to point out some of the non-technical benefits of network hardening for the business as a whole.…

    • 309 Words
    • 2 Pages
    Good Essays
  • Good Essays

    b. Require the use of authorization tokens, have a real-time lockout procedure if token is lost, or stolen…

    • 299 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    It is important to have secure systems in place in respect of information handling in order to…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    In order to protect our national infrastructure and the vital private information of our citizens from hackers, enemy…

    • 1960 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    The new world economy is an environment where information and resources can instantly span the globe with the touch of a…

    • 1394 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    While both of the above elements of the question complement each other, without understanding the main purpose of security management, which is in itself is multifaceted in nature, and ideally to be successful should be employed throughout all aspects of a business, as can be seen…

    • 1598 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    In 1980, James Anderson’s paper, Computer Security Threat Monitoring and Surveillance, bore the notion of intrusion detection. Through government funding and serious corporate interest allowed for intrusion detection systems(IDS) to develope into their current state. So what exactly is IDS? An IDS is used to detect malicious network traffic and computer usage through attack signatures. The IDS watches for attacks not only from incoming internet traffic but also for attacks that originate in the system. When a potential attack is detected the IDS logs the information and sends an alert to the console. How the alert is detected and handled at is dependent on the type of IDS in place. Through this paper we will discuss the different types of IDS and how they detect and handle the alerts, the difference between a passive and a reactive system and some general IDS intrusion invasion techniques.…

    • 1603 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Syllabus of 8th Sem

    • 728 Words
    • 3 Pages

    SEMESTER VIII CRYPTOGRAPHY AND NETWORK SECURITY L T P M C 3 1 0 100 4 UNIT I INTRODUCTION 9+3 OSI Security Architecture - Classical Encryption techniques – Cipher Principles – Data Encryption Standard – Block Cipher Design Principles and Modes of Operation - Evaluation criteria for AES – AES Cipher – Triple DES – Placement of Encryption Function – Traffic Confidentiality UNIT II PUBLIC KEY CRYPTOGRAPHY 9+3 Key Management - Diffie-Hellman key Exchange – Elliptic Curve Architecture and Cryptography - Introduction to Number Theory – Confidentiality using Symmetric Encryption – Public Key Cryptography and RSA. UNIT III AUTHENTICATION AND HASH FUNCTION 9+3 Authentication requirements – Authentication functions – Message Authentication Codes – Hash Functions – Security of Hash Functions and MACs – MD5 message Digest algorithm - Secure Hash Algorithm – RIPEMD – HMAC Digital Signatures – Authentication Protocols – Digital Signature Standard UNIT IV NETWORK SECURITY 9+3 Authentication Applications: Kerberos – X.509 Authentication Service – Electronic Mail…

    • 728 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Crime Information System

    • 507 Words
    • 3 Pages

    Information system record keeping, reduce redundancy, speed up work rate also prevent intruders or unauthorized users from getting access to our confidential information.…

    • 507 Words
    • 3 Pages
    Satisfactory Essays