5 research outputs found

    Analysis of the SYN Flood DoS Attack

    Get PDF
    The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol) segments when SYN flag is ON, which gives space for a DoS (Denial of Service) attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection algorithms as an effective mechanism against this type of attack. Finally, practical approaches against SYN flood attack for Linux and Windows environment are shown

    TCP-SYN Flooding Attack in Wireless Networks

    Get PDF
    This paper concerns the TCP (Transmission Control Protocol) vulnerabilities which gives space for a DoS (Denial of Service) attacks called TCP-SYN flooding which is well-known to the community for several years. The paper shows this attack in wireless as well as wired networks using perl synflood script, Wireshark network analyzer server, Windows 2008 server, and OPNET simulation environment. Using these tools an effects of this attack are shown. Finally, some effective practical mitigation techniques against SYN flooding attack for Linux and Windows systems are explained

    Novel Model of Adaptive Module for Security and QoS Provisioning in Wireless Heterogeneous Networks

    Get PDF
    Considering the fact that Security and Quality-Of-Service (QoS) provisioning for multimedia traffic in Wireless Heterogeneous Networks are becoming increasingly important objectives, in this paper we are introducing a novel adaptive Security and QoS framework. This framework is planned to be implemented in integrated network architecture (UMTS, WiMAX and WLAN). The aim of our novel framework is presenting a new module that shall provide the best QoS provisioning and secure communication for a given service using one or more wireless technologies in a given time

    ΠšΠΎΠΌΠΏΠ°Ρ€Π°Ρ†ΠΈΡ˜Π° ΠΈ моТности Π½Π° QKD Ρ‚Π΅Ρ…Π½ΠΈΠΊΠ°Ρ‚Π°

    Get PDF
    Π’ΠΎ овој Ρ‚Ρ€ΡƒΠ΄ сС Ρ€Π°Π·Π³Π»Π΅Π΄Π°Π½ΠΈ соврСмСнитС Π’Π΅Ρ…Π½ΠΈΠΊΠΈ Π·Π° Π΄ΠΈΡΡ‚Ρ€ΠΈΠ±ΡƒΡ†ΠΈΡ˜Π° Π½Π° ΠΊΠ²Π°Π½Ρ‚Π΅Π½ ΠΊΠ»ΡƒΡ‡ (Quantum Key Distribution) Π²ΠΎ областа Π½Π° сигурноснитС ΠΊΠΎΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΠΈ, ΠΊΠΎΠΈ прСтставуваат Π΅Π΄Π΅Π½ ΠΎΠ³Ρ€ΠΎΠΌΠ΅Π½ Ρ‡Π΅ΠΊΠΎΡ€ Π½Π°ΠΏΡ€Π΅Π΄ Π²ΠΎ Ρ€Π°Π·Π²ΠΎΡ˜ΠΎΡ‚ Π½Π° ΠΊΡ€ΠΈΠΏΡ‚ΠΎΠ³Ρ€Π°Ρ„ΠΈΡ˜Π°Ρ‚Π° ΠΈ бСзбСдноснитС ΠΊΠΎΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΠΈ Π²ΠΎΠΎΠΏΡˆΡ‚ΠΎ. Π‘ΠΎ Π½Π΅Π²ΠΈΠ΄Π΅Π½ΠΈΠΎΡ‚ Ρ€Π°Π·Π²ΠΎΡ˜ Π½Π° ΠΊΠ²Π°Π½Ρ‚Π½Π°Ρ‚Π° Ρ„ΠΈΠ·ΠΈΠΊΠ°, ΠΏΡ€Π΅ΠΊΡƒ самата Π΄ΠΈΡΡ‚Ρ€ΠΈΠ±ΡƒΡ†ΠΈΡ˜Π° Π½Π° ΠΊΠ²Π°Π½Ρ‚Π΅Π½ ΠΊΠ»ΡƒΡ‡ кој Π΅ рСчиси Π½Π΅Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎ Π΄Π° сС ΠΏΡ€ΠΎΠ±ΠΈΠ΅ со класичнитС Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΠΈ, сС јавија Π½ΠΈΠ·Π° Π½ΠΎΠ²ΠΈ моТности, особСно Π²ΠΎ сфСрата Π½Π° ΠΊΡ€ΠΈΠΏΡ‚ΠΎΠ»ΠΎΠ³ΠΈΡ˜Π°Ρ‚Π°. Π”Π°Π΄Π΅Π½ Π΅ ΠΈ осврт Π½Π° Π°ΠΊΡ‚ΡƒΠ΅Π»Π½ΠΈΡ‚Π΅ QKD ΠΏΡ€ΠΈΠ½Ρ†ΠΈΠΏΠΈ ΠΈ ΡƒΡ€Π΅Π΄ΠΈ со ΠΊΠΎΠ½ΠΊΡ€Π΅Ρ‚Π½Π° ΠΊΠΎΠΌΠΏΠ°Ρ€Π°Ρ†ΠΈΡ˜Π° ΠΏΠΎΠΌΠ΅Ρ“Ρƒ QKD Ρ‚Π΅Ρ…Π½ΠΈΠΊΠΈΡ‚Π΅. ΠŸΡ€Π΅Ρ‚ΡΡ‚Π°Π²Π΅Π½ΠΈ сС ΠΈ Π½ΠΎΠ²ΠΈΡ‚Π΅Ρ‚ΠΈΡ‚Π΅ ΠΈ моТноститС Π½Π° иститС ΠΏΡ€Π΅ΠΊΡƒ Π½ΠΈΠ·Π° Π½Π° СкспСримСнти ΠΈ Π°ΠΏΠ»ΠΈΠΊΠ°Ρ†ΠΈΠΈ ΠΊΠ°Π΄Π΅ ΡˆΡ‚ΠΎ сС ΡƒΠΏΠΎΡ‚Ρ€Π΅Π±ΡƒΠ²Π°Π°Ρ‚

    Authentication, Authorization and Accounting Provided by Diameter Protocol

    Get PDF
    The architecture and protocols for authentication, authorization, and accounting (AAA) are one of the most important design considerations in the next generation wireless networks. Many advances have been made to exploit the benefits of the current systems based on the protocol Remote Authentication Dial In User Service (RADIUS) protocol, and its evolution into the more secure, robust, and scalable Diameter protocol. Diameter is the protocol of choice for the IP multimedia subsystem (IMS) architecture, the core technology for the next generation networks. It is envisioned that Diameter will be widely used in various wired and wireless systems to facilitate robust and seamless AAA. In this paper, we provide an overview of the Diameter protocol, and short summary of the current and future trends related to the Diameterbased AAA systems
    corecore