全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Do ICMP Security Attacks Have Same Impact on Servers?

DOI: 10.4236/jis.2017.83018, PP. 274-283

Keywords: DDoS Security Attacks, ICMP Based Cyber Attacks, Mac Server OS, Windows Server OS

Full-Text   Cite this paper   Add to My Lib

Abstract:

There are different types of Cyber Security Attacks that are based on ICMP protocols. Many ICMP protocols are very similar, which may lead security managers to think they may have same impact on victim computer systems or servers. In this paper, we investigate impact of different ICMP based security attacks on two popular server systems namely Microsoft’s Windows Server and Apple’s Mac Server OS running on same hardware platform, and compare their performance under different types of ICMP based security attacks.

References

[1]  Kumar, S. and Gade, R. (2015) Windows 2008 vs. Windows 2003: Evaluation of Microsoft’s Windows Servers under Cyber Attacks. Journal of Information Security.
[2]  Kumar, S., Valdez, R. and Gomez, O. (2006) Survivability Evaluation of Wireless Sensor Networks under DDoS Attack. International Conference on Networking.
https://doi.org/10.1109/ICNICONSMCL.2006.205
[3]  Kumar, S. (2005) Impact of Distributed Denial of Service (DDoS) Attack Due to ARP-Storm. The Lecture Notes in Computer Science-Book Series-LNCS-3421-Networking-ICN 2005, Part-II, Vol. 3421, 997-1002.
https://doi.org/10.1007/978-3-540-31957-3_113
[4]  Kumar, S. and Sekhar, R. (2011) Experimental Evaluation of Juniper Network’s Netscreen-5GT Security Device against Layer4 Flood Attacks. Journal of Information Security, 2, 50-58.
https://doi.org/10.4236/jis.2011.21005
[5]  Vellalacheruvu, H.K. and Kumar, S. (2011) Effectiveness of Built-In Security Protection of Microsoft’s Windows Server 2003 against TCP SYN Based DDoS Attacks. Journal of Information Security, 2, 131-138.
https://doi.org/10.4236/jis.2011.23013
[6]  Gade, R.S.R., Vellalacheruvu, H. and Kumar, S. (2010) Performance of Windows XP, Windows Vista and Apple’s Leopard Systems under a DDoS Attack. International Conference on Digital Society (ICDS’10).
[7]  Surisetty, S. and Kumar, S. (2012) Microsoft’s Windows7 vs. Apple’s Snow Leopard: An Experimental Evaluation of Resilience against Distributed Denial of Service (DDoS) Attacks. IEEE Security and Privacy, 10, 60-64.
[8]  Baez Jr., R. and Kumar, S. (2014) Apple’s Lion vs. Microsoft’s Windows 7: Comparing Built-In Protection against ICMP Flood Attacks. Journal of Information Security, 5, 123-135.
https://doi.org/10.4236/jis.2014.53012
[9]  Sundar, K. and Kumar, S. (2016) BlueScreen of Death Observed for the Microsoft’s Server 2012 R2 under Denial of Service Attacks. Journal of Information Security, 7, 225-231.
https://doi.org/10.4236/jis.2016.74018
[10]  Surisetty, S. and Kumar, S. (2010) Is Apple’s iMac Leopard Operating System Secure under ARP-Based Flooding Attacks? Second International Conference on Internet Monitoring and Protection (ICIMP 2010).
https://doi.org/10.1109/ICIMP.2010.30
[11]  Kumar, S. and Surishetty, S. (2011) Apple’s Leopard versus Microsoft’s Windows XP: Experimental Evaluation of Apple’s Leopard Operating System with Windows XP-SP2 under Distributed Denial of Service Security Attacks. Information Security Journal: A Global Perspective, 20, 163-172.
[12]  Aishwarya, R. and Malliga, S. (2014) Intrusion Detection System—An Efficient Way to Thwart against Dos/DDoS Attack in the Cloud Environment. International Conference on Recent Trends in Information Technology, Chennai, 10-12 April 2014, 1-6.
[13]  Kumar, S. (2007) Smurf-Based Distributed Denial of Service (DDoS) Attack Amplification in Internet. 2nd International Conference on Internet Monitoring and Protection (ICIMP), San Jose, 1-5 July 2007, 25.
[14]  Kumar, S. (2006) PING Attack—How Bad Is It. Computers & Security, 25, 332-337.
[15]  Smurf Attack.
http://en.wikipedia.org/wiki/Smurf_attack
[16]  Ferguson, P. and Senie, D. (2000) Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing. RFC 2827, BCP 38.
[17]  Mac Pro (2010) Technical Specifications.
http://support.apple.com/kb/SP589?locale=en_US
[18]  Solid-State Drive Replacement Instructions for Mac Pro.
http://manuals.info.apple.com/MANUALS/1000/MA1548/en_US/Mac_Pro_SSD_DIY.pdf
[19]  Apple Statement on Core Distribution.
http://support.apple.com/en-us/HT201838

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133