Abstract
Although cyber attacks are becoming smarter and use more advanced technologies, existing security mechanisms cannot promptly detect or respond to such attacks. For example, IP spoofing is effectively used to attack a security model using authentication process based on IP address or host name and, there is a large number of measures to detect such an attack. However, a malicious user can make a bypass attack by analyzing vulnerabilities. This study, therefore, has analyzed the vulnerability of 4-step BASE mechanism exploited by a bypass attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ferguson, P.: Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing, ferguson 2000 network (2000)
Dalal, Y.K., Metcalfe, R.M.: Reverse path forwarding of broadcast packets. Communications of the ACM 21(12), 1040–1048 (1978)
Lee, H., Kwon, M., Hasker, G., Perrig, A.: BASE: An incrementally deployable mechanism for viable IP spoofing prevention. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, pp. 20–31 (2007)
Gil, T.M., Poletto, M.: Proceedings of the 10th conference on USENIX Security Symposium, pp. 3–8 (2001)
Tanase, M.: IP spoofing: an introduction. Security Focus 11 (2003)
Murphy, S.: BGP security vulnerabilities analysis, murphy2006bgp (2006)
Kedem, G., Ishihara, Y.: Brute force attack on UNIX passwords with SIMD computer, pp. 8–12. USENIX Association (1999)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag GmbH Berlin Heidelberg
About this paper
Cite this paper
Jung, S., Kim, J.H., Kim, S. (2012). Study on 4-Step BASE Mechanism Vulnerability Analysis and Design of Evasion Attack Method for Smart Network. In: Zhu, M. (eds) Business, Economics, Financial Sciences, and Management. Advances in Intelligent and Soft Computing, vol 143. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27966-9_57
Download citation
DOI: https://doi.org/10.1007/978-3-642-27966-9_57
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27965-2
Online ISBN: 978-3-642-27966-9
eBook Packages: EngineeringEngineering (R0)