Academic literature on the topic 'Smurf attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Smurf attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Smurf attacks"

1

Sun, Fei Xian. "Danger Theory Based Risk Evaluation Model for Smurf Attacks." Key Engineering Materials 467-469 (February 2011): 515–21. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.515.

Full text
Abstract:
Smurf attack belongs to popular Denial-of-Service (DoS) attack, and they can cause devastating impact on computer systems. Inspired by the principles of immune danger theory, a novel risk evaluation model, referred to as DTRESA, for smurf attacks is proposed in this paper. Within the presented model, dangerous smurf attacks are compared to bacterium (or virus) of the immune danger theory, which induce danger signal by simulating cellular distress or cell unnatural death; through immune recognition of artificial lymphocytes, the attacks are detected, and the attack risk is evaluated by calculating the danger signal of host computers. Simulation results and theoretical analysis show that the proposed model is feasible. Thus, it provides a novel solution to DoS detection and computer network security risk assessment.
APA, Harvard, Vancouver, ISO, and other styles
2

Hartanto, Sri. "The Impact of Smurf Attack on Web Server In Communication Network And Its Preventions." Impact of Smurf Attack on Web Server In Communication Network And Its Preventions 1, Vol. 1 No. 1 (2023): July 2023 (2024): 12. https://doi.org/10.59890/ijsas.v1i1.138.

Full text
Abstract:
The Smurf Attack is a type of Distributed Denial of Service (DDoS). Generally, DDoS attacks that paralyze the Web server computer as the target of the attack so that it cannot provide services. Smurf Attacks send a Gropher Communication Packet request (PING Request) to all addresses in a communication network by broadcast. All computers within the broadcast address will answer the PING request. If a network system has many computers (devices) and PING is broadcast continuously, the network system can be met by responses from PING requests, which results in the bandwidth of the communication network being reduced or even exhausted, so that the communication network becomes slow and paralysed. In order to identify how a Smurf Attack occurs on a Web Server computer, in this research, a simulation of a Smurf Attack is carried out on a Web Server computer in a Local Area Network (LAN) and observes the number of packets received by a Web Server computer to determine the performance of the Web Server computer after receiving a Smurf Attack.
APA, Harvard, Vancouver, ISO, and other styles
3

Paradise, Paradise, Wahyu Adi Prabowo, and Teguh Rijanandi. "Analysis of Distributed Denial of Service Attacks Using Support Vector Machine and Fuzzy Tsukamoto." JURNAL MEDIA INFORMATIKA BUDIDARMA 7, no. 1 (2023): 66. http://dx.doi.org/10.30865/mib.v7i1.5199.

Full text
Abstract:
Advances in technology in the field of information technology services allow hackers to attack internet systems, one of which is the DDOS attack, more specifically, the smurf attack, which involves multiple computers attacking database server systems and File Transfer Protocol (FTP). The DDOS smurf attack significantly affects computer network traffic. This research will analyze the classification of machine learning Support Vector Machine (SVM) and Fuzzy Tsukamoto in detecting DDOS attacks using intensive simulations in analyzing computer networks. Classification techniques in machine learning, such as SVM and fuzzy Tsukamoto, can make it easier to distinguish computer network traffic when detecting DDOS attacks on servers. Three variables are used in this classification: the length of the packet, the number of packets, and the number of packet senders. By testing 51 times, 50 times is the DDOS attack trial dataset performed in a computer laboratory, and one dataset derived from DDOS attack data is CAIDA 2007 data. From this study, we obtained an analysis of the accuracy level of the classification of machine learning SVM and fuzzy Tsukamoto, each at 100%.
APA, Harvard, Vancouver, ISO, and other styles
4

А.Т., Кобевко, та Тимченко О.В. "Нечітке дерево рішень для мережевого захисту від DoS-атак". Моделювання та інформаційні технології. Зб. наук. пр. ІПМЕ ім. Г.Є. Пухова НАН України, № 88 (15 грудня 2019): 203–8. https://doi.org/10.5281/zenodo.3859687.

Full text
Abstract:
An Intrusion Detection System is a tool that can detect intrusions into a host, network, and application. DoS attack is one of the most common network attacks. During this time, the host sends a huge number of packets per machine and thus slows down the network and the host. There are a number of algorithms for detecting DoS attacks, and most of these solutions generate a high number of false alarms. The paper considers a new method of constructing a fuzzy solution tree for monitoring network flow in case of Smurf, Mail-Bomb and Ping-of-Death attacks.
APA, Harvard, Vancouver, ISO, and other styles
5

Arif Wirawan Muhammad, Muhammad Nur Faiz, and Ummi Athiyah. "Pengembangan Perangkat Lunak Untuk Deteksi DDoS Berbasis Neural Network." Infotekmesin 13, no. 2 (2022): 301–7. http://dx.doi.org/10.35970/infotekmesin.v13i2.1544.

Full text
Abstract:
System security issues are a vital factor that needs to be considered in the operation of systems and networks, which will later be used for disaster mitigation and preventing attacks on the network. Distributed Denial of Services (DDoS) is a form of attack carried out by individuals or groups to damage data through servers or malware in the form of flooding packets, therefore it can paralyze the network system used. Network security is a factor that must be maintained and considered in an information system. DDoS can take the form of Ping of Death, flood, Remote control attack, User Data Protocol (UDP) flood, and Smurf Attack. This study aims to develop software to detect DDoS attacks based on network traffic logs. The software has been tested and run according to the neural network algorithm. This software was developed with an interface that makes it easier for users to detect the source IP whether the IP is carrying out a DDoS attack or normal.
APA, Harvard, Vancouver, ISO, and other styles
6

Razumov, P. V., L. V. Cherckesova, O. A. Safaryan, and I. Strubchik. "Smurf as Spoof Type Attacking Activity on Network and Neutralization." Journal of Physics: Conference Series 2131, no. 2 (2021): 022078. http://dx.doi.org/10.1088/1742-6596/2131/2/022078.

Full text
Abstract:
Abstract Reliable and timely detection of cyberattacks is becoming indispensable for securing networks and systems. Internet Control Message Protocol (ICMP) flood attacks continue to be one of the most serious threats in both IPv4 and IPv6 networks. There are various types of cybersecurity attacks based on ICMP protocols. Many ICMP protocols are very similar, so security managers might think they might have the same impact on the victim’s computer systems or servers.
APA, Harvard, Vancouver, ISO, and other styles
7

Etza nofarita. "IMPLEMENTASI APLIKASI SOFTWARE NATURAL NETWORK MENDETEKSI TINGKATAN SERANGAN DDOS PADA JARINGAN KOMPUTER." Elkom : Jurnal Elektronika dan Komputer 14, no. 2 (2021): 268–77. http://dx.doi.org/10.51903/elkom.v14i2.501.

Full text
Abstract:
Security issues of a system are factors that need to be considered in the operation of information systems, which are intended to prevent threats to the system and detect and correct any damage to the system. Distributed Denial of Services (DDOS) is a form of attack carried out by someone, individuals or groups to damage data that can be attacked through a server or malware in the form of packages that damage the network system used. Security is a mandatory thing in a network to avoid damage to the data system or loss of data from bad people or heckers. Packages sent in the form of malware that attacks, causing bandwidth hit continuously. Network security is a factor that must be maintained and considered in an information system. Ddos forms are Ping of Death, flooding, Remote controled attack, UDP flood, and Smurf Attack. The goal is to use DDOS to protect or prevent system threats and improve damaged systems. Computer network security is very important in maintaining the security of data in the form of small data or large data used by the user.
APA, Harvard, Vancouver, ISO, and other styles
8

Mahmood, Hassan, Danish Mahmood, Qaisar Shaheen, Rizwan Akhtar, and Wang Changda. "S-DPS: An SDN-Based DDoS Protection System for Smart Grids." Security and Communication Networks 2021 (March 20, 2021): 1–19. http://dx.doi.org/10.1155/2021/6629098.

Full text
Abstract:
Information Communication Technology (ICT) environment in traditional power grids makes detection and mitigation of DDoS attacks more challenging. Existing security technologies, besides their efficiency, are not adequate to cater to DDoS security in Smart Grids (SGs) due to highly distributed and dynamic network environments. Recently, emerging Software Defined Networking- (SDN-) based approaches are proposed by researchers for SG’s DDoS protection; however, they are only able to protect against flooding attacks and are dependent on static thresholds. The proposed approach, i.e., Software Defined Networking-based DDoS Protection System (S-DPS), is efficiently addressing these issues by employing light-weight Tsallis entropy-based defense mechanisms using SDN environment. It provides early detection mechanism with mitigation of anomaly in real time. The approach offers the best deployment location of defense mechanism due to the centralized control of network. Moreover, the employment of a dynamic threshold mechanism is making detection process adaptive to the changing network conditions. S-DPS has demonstrated its effectiveness and efficiency in terms of Detection Rate (DR) and minimal CPU/RAM utilization, considering DDoS protection focusing smurf attacks, socket stress attacks, and SYN flood attacks.
APA, Harvard, Vancouver, ISO, and other styles
9

Rao, Gottapu Sankara, and P. Krishna Subbarao. "A Novel Approach for Detection of DoS / DDoS Attack in Network Environment using Ensemble Machine Learning Model." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 244–53. http://dx.doi.org/10.17762/ijritcc.v11i9.8340.

Full text
Abstract:
One of the most serious threat to network security is Denial of service (DOS) attacks. Internet and computer networks are now important parts of our businesses and daily lives. Malicious actions have become more common as our reliance on computers and communication networks has grown. Network threats are a big problem in the way people communicate today. To make sure that the networks work well and that users' information is safe, the network data must be watched and analysed to find malicious activities and attacks. Flooding may be the simplest DDoS assault. Computer networks and services are vulnerable to DoS and DDoS attacks. These assaults flood target systems with malicious traffic, making them unreachable to genuine users. The work aims to enhance the resilience of network infrastructures against these attacks and ensure uninterrupted service delivery. This research develops and evaluates enhanced DoS/DDoS detection methods. DoS attacks usually stop or slow down legal computer or network use. Denial-of-service (DoS) attacks prevent genuine users from accessing and using information systems and resources. The OSI model's layers make up the computer network. Different types of DDoS strikes target different layers. The Network Layer can be broken by using ICMP Floods or Smurf Attacks. The Transport layer can be attacked using UDP Floods, TCP Connection Exhaustion, and SYN Floods. HTTP-encrypted attacks can be used to get through to the application layer. DoS/DDoS attacks are malicious attacks. Protect network data from harm. Computer network services are increasingly threatened by DoS/DDoS attacks. Machine learning may detect prior DoS/DDoS attacks. DoS/DDoS attacks proliferate online and via social media. Network security is IT's top priority. DoS and DDoS assaults include ICMP, UDP, and the more prevalent TCP flood attacks. These strikes must be identified and stopped immediately. In this work, a stacking ensemble method is suggested for detecting DoS/DDoS attacks so that our networked data doesn't get any worse. This paper used a method called "Ensemble of classifiers," in which each class uses a different way to learn. In proposed methodology Experiment#1 , I used the Home Wifi Network Traffic Collected and generated own Dataset named it as MywifiNetwork.csv, whereas in proposed methodology Experiment#2, I used the kaggle repository “NSL-KDD benchmark dataset” to perform experiments in order to find detection accuracy of dos attack detection using python language in jupyter notebook. The system detects attack-type or legitimate-type of network traffic during detection ML classification methods are used to compare how well the suggested system works. The results show that when the ensembled stacking learning model is used, 99% of the time it is able to find the problem. In proposed methodology two Experiments are implemented for comparing detection accuracy with the existing techniques. Compared to other measuring methods, we get a big step forward in finding attacks. So, our model gives a lot of faith in securing these networks. This paper will analyse the behaviour of network traffics.
APA, Harvard, Vancouver, ISO, and other styles
10

Najm Abdulla, Nazanin, and Rajaa K. Hasoun. "Review of Detection Denial of Service Attacks using Machine Learning through Ensemble Learning." Iraqi Journal for Computers and Informatics 48, no. 1 (2022): 13–20. http://dx.doi.org/10.25195/ijci.v48i1.349.

Full text
Abstract:
Today's network hacking is more resource-intensive because the goal is to prohibit the user from using the network's resources when the target is either offensive or for financial gain, especially in businesses and organizations. That relies on the Internet like Amazon Due to this, several techniques, such as artificial intelligence algorithms like machine learning (ML) and deep learning (DL), have been developed to identify intrusion and network infiltration and discriminate between legitimate and unauthorized users. Application of machine learning and ensemble learning algorithms to various datasets, consideration of homogeneous ensembles using a single algorithm type or heterogeneous ensembles using several algorithm types, and evaluation of the discovery outcomes in terms of accuracy or discovery error for detecting attacks. The survey literature provides an overview of the many approaches and approaches of one or more machine-learning algorithms used in various datasets to identify denial of service attacks. It has also been shown that employing the hybrid approach is the most common and produces better attack detection outcomes than using the sole approaches. Numerous machine learning techniques, including support vector machines (SVM), K-Nearest Neighbors (KNN), and ensemble learning like random forest (RF), bagging, and boosting, are illustrated in this work (DT). That is employed in several articles to identify different denial of service (DoS) assaults, including the trojan horse, teardrop, land, smurf, flooding, and worm. That attacks network traffic and resources to deny users access to the resources or to steal confidential information from the company without damaging the system and employs several algorithms to obtain high attack detection accuracy and low false alarm rates.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Smurf attacks"

1

Cao, Wantian, and Xingchuan Bao. "The Research on the Detection and Defense Method of the Smurf-Type DDos Attack." In Proceedings of International Conference on Soft Computing Techniques and Engineering Application. Springer India, 2013. http://dx.doi.org/10.1007/978-81-322-1695-7_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Smurf attacks"

1

Hasan, Ali, Tahir Iqbal, Mazhar Naseer, Nadeem Sarwar, Aitizaz Ali, and Mohamed Shabir. "Advanced Detection and Mitigation of Smurf Attacks Using AI and SDN." In 2024 International Conference on Decision Aid Sciences and Applications (DASA). IEEE, 2024. https://doi.org/10.1109/dasa63652.2024.10836590.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zargar, Gholam Reza, and Peyman Kabiri. "Identification of effective network features to detect Smurf attacks." In 2009 IEEE Student Conference on Research and Development (SCOReD). IEEE, 2009. http://dx.doi.org/10.1109/scored.2009.5443345.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bouyeddou, Benamar, Fouzi Harrou, Ying Sun, and Benamar Kadri. "Detection of smurf flooding attacks using Kullback-Leibler-based scheme." In 2018 4th International Conference on Computer and Technology Applications (ICCTA). IEEE, 2018. http://dx.doi.org/10.1109/cata.2018.8398647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kumar, S., M. Azad, O. Gomez, and R. Valdez. "Can Microsoft’s Service Pack2 (SP2) Security Software Prevent SMURF Attacks?" In Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06). IEEE, 2006. http://dx.doi.org/10.1109/aict-iciw.2006.60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Revathy, G., V. Rajendran, P. Sathish Kumar, S. Vinuharini, and G. N. Roopa. "Smurf attack using hybrid machine learning technique." In INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN SCIENCE AND TECHNOLOGY (RIST 2021). AIP Publishing, 2022. http://dx.doi.org/10.1063/5.0080211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zheng, Jigang, and Jingmei Zhang. "Cluster Analysis of Smurf Type of Denial of Service Attack." In 2016 4th International Conference on Management, Education, Information and Control (MEICI 2016). Atlantis Press, 2016. http://dx.doi.org/10.2991/meici-16.2016.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kumar, Sanjeev. "Smurf-based Distributed Denial of Service (DDoS) Attack Amplification in Internet." In Second International Conference on Internet Monitoring and Protection (ICIMP 2007). IEEE, 2007. http://dx.doi.org/10.1109/icimp.2007.42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Singh, Navneet Kumar, and Santhosh Kumar B. J. "Detection and Prevention of UDP Protocol Exploiting and Smurf Attack in WSN Using Sequential Probability Ratio Test Algorithm." In 2023 International Conference on Data Science and Network Security (ICDSNS). IEEE, 2023. http://dx.doi.org/10.1109/icdsns58469.2023.10245010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!