Advertisement

Simulation Analysis of DoS, MITM and CDP Security Attacks and Countermeasures

  • Biljana Tanceska
  • Mitko Bogdanoski
  • Aleksandar RisteskiEmail author
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 159)

Abstract

In this paper, an analysis of security attacks on network elements along with the appropriate countermeasures is presented. The network topology that has been attacked is designed in GNS3 software tool installed on Windows operating system, while the attacks are performed in Kali Linux operating system. Three groups of security attacks (Denial of Service, Man in the Middle, and Control Plane attacks) are observed in simulation scenarios with a detailed analysis on each of them, followed by a presentation of practical performance and ways of prevention (protection) against the attacks.

Keywords

GNS3 software tool Kali linux OS Network topology Attacks Denial of service Man in the middle Control plane Prevention 

References

  1. 1.
    Stojanoski, P., Bogdanoski, M., Risteski, A.: Wireless local area network behavior under RTS flood DoS attack. In: 20th Telecommunications Forum TELFOR 2012. IEEE (2012)Google Scholar
  2. 2.
    Bogdanoski, M., Risteski, A.: Wireless network behavior under ICMP ping flood DoS attack and mitigation techniques. Int. J. Commun. Netw. Inf. Secur. (IJCNIS) 3(1), 2 (2011)Google Scholar
  3. 3.
    Bogdanoski, M., Suminoski, T., Risteski, A.: Analysis of the SYN flood DoS attack. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 5(8), 1–11 (2013)Google Scholar
  4. 4.
    Preimesburger, C.: DDoS Attack Volume Escalates as New Methods Emerge, 28 May 2014Google Scholar
  5. 5.
    TELELINK, Access Networking Threats, IT Threats (2013)Google Scholar
  6. 6.
    TELELINK, Corporate WAN Threats, IT Threats – Control Plane attack (2013)Google Scholar
  7. 7.
    Straatsma, P.: Rogue DHCP Server with DHCP Starvation and Rogue Routing, November 2013Google Scholar

Copyright information

© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015

Authors and Affiliations

  • Biljana Tanceska
    • 1
  • Mitko Bogdanoski
    • 2
  • Aleksandar Risteski
    • 1
    Email author
  1. 1.Faculty of Electrical Engineering and Information TechnologiesSaints Cyril and Methodius UniversitySkopjeMacedonia
  2. 2.Military Academy “General Mihailo Apostolski”Goce Delcev UniversitySkopjeMacedonia

Personalised recommendations