Detecting and Preventing Cyber Attacks on Local Area Networks : A Working Example
Sezer YILDIZ1 , Umut ALTINIŞIK2
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-11 , Page no. 1-6, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.16
Online published on Nov 30, 2018
Copyright © Sezer YILDIZ, Umut ALTINIŞIK . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Sezer YILDIZ, Umut ALTINIŞIK, “Detecting and Preventing Cyber Attacks on Local Area Networks : A Working Example,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.1-6, 2018.
MLA Style Citation: Sezer YILDIZ, Umut ALTINIŞIK "Detecting and Preventing Cyber Attacks on Local Area Networks : A Working Example." International Journal of Computer Sciences and Engineering 6.11 (2018): 1-6.
APA Style Citation: Sezer YILDIZ, Umut ALTINIŞIK, (2018). Detecting and Preventing Cyber Attacks on Local Area Networks : A Working Example. International Journal of Computer Sciences and Engineering, 6(11), 1-6.
BibTex Style Citation:
@article{YILDIZ_2018,
author = {Sezer YILDIZ, Umut ALTINIŞIK},
title = {Detecting and Preventing Cyber Attacks on Local Area Networks : A Working Example},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {1-6},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3118},
doi = {https://doi.org/10.26438/ijcse/v6i11.16}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.16}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3118
TI - Detecting and Preventing Cyber Attacks on Local Area Networks : A Working Example
T2 - International Journal of Computer Sciences and Engineering
AU - Sezer YILDIZ, Umut ALTINIŞIK
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 1-6
IS - 11
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
1047 | 1017 downloads | 356 downloads |
Abstract
To ensure secure communication on the network, the principles of confidentiality, integrity and accessibility must be carried out in unity. To prevent external attacks on the network, many threats are eliminated by using firewalls between the external network and the internal network. However, different security scenarios need to be implemented against threats that may come from within the local area networks. For this reason, the factors that may cause security vulnerabilities in the internal network should be checked and the security should be considered. One of the most important problems encountered here is the unnecessary network traffic that occurs in internal networks, slowing the system and making it inoperable. In this article, using the GNS3 (Graphical Network Simulator) network simulation program, MAC (Media Access Control) flood, DHCP (Dynamic Host Configuration Protocol) starvation and spoofing and Arp (Address Resolution Protocol) poisoning attacks are detected and a working example has been carried out to prevent it.
Key-Words / Index Term
GNS3, Network Security, MAC flood, DHCP attacks, ARP poisoning
References
[1] Singer, P. W., Friedman, A, Cybersecurity: What everyone needs to know. Oxford University Press. pp.102-104, 2014.
[2] Bella, G., Bistarelli, S. , “Soft constraints for security protocol analysis: Confidentiality. In International Symposium on Practical Aspects of Declarative Languages”. Springer, Berlin, Heidelberg,pp. 108-122, 2001.
[3] Heberlein, L. T., Dias, G. V., Levitt, K. N., Mukherjee, B., Wood, J., Wolber, D, “A network security monitor. In Research in Security and Privacy”, Proceedings., IEEE Computer Society Symposium on, pp. 296-304,1990.
[4] Wullems, C., Tham, K., Smith, J., Looi, M., “A trivial denial of service attack on IEEE 802.11 direct sequence spread spectrum wireless LANs”, In Wireless Telecommunications Symposium, pp. 129-136, 2004.
[5] Chordiya, A. R., Majumder, S., Javaid, A. Y., “Man-in-the-Middle (MITM) Attack Based Hijacking of HTTP Traffic Using Open Source Tools.”, In 2018 IEEE International Conference on Electro/Information Technology (EIT), pp. 438-443, 2018.
[6] Nayak, G. N., Samaddar, S. G., “Different flavours of man-in-the-middle attack, consequences and feasible solutions.”, In Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on, Vol. 5, pp. 491-495, 2010.
[7] Ansari, A., Waheed, M. A., “Flooding attack detection and prevention in MANET based on cross layer link quality assessment.”, In Intelligent Computing and Control Systems (ICICCS), International Conference on IEEE, pp. 612-617,2017.
[8] Tripathi, N., Hubballi, N. , “Exploiting DHCP server-side ip address conflict detection: A dhcp starvation attack.”, In Advanced Networks and Telecommuncations Systems (ANTS), International Conference on IEEE, pp. 1-3, 2015.
[9] Aggarwal, R. K., “A Security Approach and Prevention Technique against ARP Poisoning.”, In International Conference on Information and Communication Technology for Intelligent Systems, Springer, Cham, pp. 39-49, 2017.
[10] Kumar, S., & Tapaswi, S., “A centralized detection and prevention technique against ARP poisoning.”, In Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), International Conference on IEEE, pp. 259-264, 2012.
[11] Khurana, S., Kaur, R.: A security approach to prevent ARP poisoning and defensive tools. Int. J. Comput. Commun. Syst. Eng. (IJCCSE), 2(3), 431–437, 2015.
[12] Guha, R. K., Furqan, Z., Muhammad, S., “Discovering man-in-the-middle attacks in authentication protocols.”, In Military Communications Conference, MILCOM, IEEE, pp. 1-7, 2007.
[13] Conti, M., Dragoni, N., Lesyk, V., “A Survey of Man In The Middle Attacks.”, IEEE Communications Surveys & Tutorials, pp. 2035, 2016.
[14] Yılmaz, T., Karaarslan, E., Akın, G., “GNS3 Tabanlı Ağ Emülasyonlarının Bilgisayar Ağları Eğitiminde Kullanımı: Senaryolar ve Öneriler”, Researchgate, 2013.