5 research outputs found
Analysis of the SYN Flood DoS Attack
The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol) segments when SYN flag is ON, which gives space for a DoS (Denial of Service) attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection algorithms as an effective mechanism against this type of attack. Finally, practical approaches against SYN flood attack for Linux and Windows environment are shown
TCP-SYN Flooding Attack in Wireless Networks
This paper concerns the TCP (Transmission Control Protocol) vulnerabilities which gives space for a DoS (Denial of Service) attacks called TCP-SYN flooding which is well-known to the community for several years. The paper shows this attack in wireless as well as wired networks using perl synflood script, Wireshark network analyzer server, Windows 2008 server, and OPNET simulation environment. Using these tools an effects of this attack are shown. Finally, some effective practical mitigation techniques against SYN flooding attack for Linux and Windows systems are explained
Novel Model of Adaptive Module for Security and QoS Provisioning in Wireless Heterogeneous Networks
Considering the fact that Security and Quality-Of-Service (QoS) provisioning for multimedia traffic in Wireless Heterogeneous Networks are becoming increasingly important objectives, in this paper we are introducing a novel adaptive Security and QoS framework. This framework is planned to be implemented in integrated network architecture (UMTS, WiMAX and WLAN). The aim of our novel framework is presenting a new module that shall provide the best QoS provisioning and secure communication for a given service using one or more wireless technologies in a given time
ΠΠΎΠΌΠΏΠ°ΡΠ°ΡΠΈΡΠ° ΠΈ ΠΌΠΎΠΆΠ½ΠΎΡΡΠΈ Π½Π° QKD ΡΠ΅Ρ Π½ΠΈΠΊΠ°ΡΠ°
ΠΠΎ ΠΎΠ²ΠΎΡ ΡΡΡΠ΄ ΡΠ΅ ΡΠ°Π·Π³Π»Π΅Π΄Π°Π½ΠΈ
ΡΠΎΠ²ΡΠ΅ΠΌΠ΅Π½ΠΈΡΠ΅ Π’Π΅Ρ
Π½ΠΈΠΊΠΈ Π·Π° Π΄ΠΈΡΡΡΠΈΠ±ΡΡΠΈΡΠ° Π½Π°
ΠΊΠ²Π°Π½ΡΠ΅Π½ ΠΊΠ»ΡΡ (Quantum Key Distribution) Π²ΠΎ
ΠΎΠ±Π»Π°ΡΡΠ° Π½Π° ΡΠΈΠ³ΡΡΠ½ΠΎΡΠ½ΠΈΡΠ΅ ΠΊΠΎΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΠΈ, ΠΊΠΎΠΈ
ΠΏΡΠ΅ΡΡΡΠ°Π²ΡΠ²Π°Π°Ρ Π΅Π΄Π΅Π½ ΠΎΠ³ΡΠΎΠΌΠ΅Π½ ΡΠ΅ΠΊΠΎΡ Π½Π°ΠΏΡΠ΅Π΄ Π²ΠΎ
ΡΠ°Π·Π²ΠΎΡΠΎΡ Π½Π° ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ°ΡΠ° ΠΈ Π±Π΅Π·Π±Π΅Π΄Π½ΠΎΡΠ½ΠΈΡΠ΅
ΠΊΠΎΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΠΈ Π²ΠΎΠΎΠΏΡΡΠΎ. Π‘ΠΎ Π½Π΅Π²ΠΈΠ΄Π΅Π½ΠΈΠΎΡ ΡΠ°Π·Π²ΠΎΡ
Π½Π° ΠΊΠ²Π°Π½ΡΠ½Π°ΡΠ° ΡΠΈΠ·ΠΈΠΊΠ°, ΠΏΡΠ΅ΠΊΡ ΡΠ°ΠΌΠ°ΡΠ°
Π΄ΠΈΡΡΡΠΈΠ±ΡΡΠΈΡΠ° Π½Π° ΠΊΠ²Π°Π½ΡΠ΅Π½ ΠΊΠ»ΡΡ ΠΊΠΎΡ Π΅ ΡΠ΅ΡΠΈΡΠΈ
Π½Π΅Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎ Π΄Π° ΡΠ΅ ΠΏΡΠΎΠ±ΠΈΠ΅ ΡΠΎ ΠΊΠ»Π°ΡΠΈΡΠ½ΠΈΡΠ΅
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΠΈ, ΡΠ΅ ΡΠ°Π²ΠΈΡΠ° Π½ΠΈΠ·Π° Π½ΠΎΠ²ΠΈ ΠΌΠΎΠΆΠ½ΠΎΡΡΠΈ,
ΠΎΡΠΎΠ±Π΅Π½ΠΎ Π²ΠΎ ΡΡΠ΅ΡΠ°ΡΠ° Π½Π° ΠΊΡΠΈΠΏΡΠΎΠ»ΠΎΠ³ΠΈΡΠ°ΡΠ°. ΠΠ°Π΄Π΅Π½ Π΅
ΠΈ ΠΎΡΠ²ΡΡ Π½Π° Π°ΠΊΡΡΠ΅Π»Π½ΠΈΡΠ΅ QKD ΠΏΡΠΈΠ½ΡΠΈΠΏΠΈ ΠΈ ΡΡΠ΅Π΄ΠΈ
ΡΠΎ ΠΊΠΎΠ½ΠΊΡΠ΅ΡΠ½Π° ΠΊΠΎΠΌΠΏΠ°ΡΠ°ΡΠΈΡΠ° ΠΏΠΎΠΌΠ΅ΡΡ QKD
ΡΠ΅Ρ
Π½ΠΈΠΊΠΈΡΠ΅. ΠΡΠ΅ΡΡΡΠ°Π²Π΅Π½ΠΈ ΡΠ΅ ΠΈ Π½ΠΎΠ²ΠΈΡΠ΅ΡΠΈΡΠ΅ ΠΈ
ΠΌΠΎΠΆΠ½ΠΎΡΡΠΈΡΠ΅ Π½Π° ΠΈΡΡΠΈΡΠ΅ ΠΏΡΠ΅ΠΊΡ Π½ΠΈΠ·Π° Π½Π°
Π΅ΠΊΡΠΏΠ΅ΡΠΈΠΌΠ΅Π½ΡΠΈ ΠΈ Π°ΠΏΠ»ΠΈΠΊΠ°ΡΠΈΠΈ ΠΊΠ°Π΄Π΅ ΡΡΠΎ ΡΠ΅
ΡΠΏΠΎΡΡΠ΅Π±ΡΠ²Π°Π°Ρ
Authentication, Authorization and Accounting Provided by Diameter Protocol
The architecture and protocols for
authentication, authorization, and accounting
(AAA) are one of the most important design
considerations in the next generation wireless
networks. Many advances have been made to
exploit the benefits of the current systems based
on the protocol Remote Authentication Dial In
User Service (RADIUS) protocol, and its evolution
into the more secure, robust, and scalable
Diameter protocol. Diameter is the protocol of
choice for the IP multimedia subsystem (IMS)
architecture, the core technology for the next
generation networks. It is envisioned that
Diameter will be widely used in various wired and
wireless systems to facilitate robust and seamless
AAA. In this paper, we provide an overview of the
Diameter protocol, and short summary of the
current and future trends related to the Diameterbased
AAA systems