Design and Implementation of a Real Time Access Log for IP Fragmentation Attack Detection


The KIPS Transactions:PartA, Vol. 8, No. 4, pp. 331-338, Dec. 2001
10.3745/KIPSTA.2001.8.4.331,   PDF Download:

Abstract

With the general use of network, cyber terror rages throughout the world. However, IP Fragmentation isn't free from its security problem yet, even though it guarantees effective transmission of the IP package in its network environment. Illegal invasion could happen or disturb operation of the system by using attack mechanism such as IP Spoofing, Ping of Death, or ICMP taking advantage of defectiveness, if any, which IP Fragmentation needs improving. Recently, apart from service refusal attack using IP Fragmentation, there arises a problem that it is possible to detour packet filtering equipment or network-based attack detection system using IP Fragmentation. In the paper, we generate the real time access log file to make the system manager help decision support and to make the system manage itself in case that some routers or network-based attack detection systems without packet reassembling function could not detect or suspend illegal invasion with divided datagrams of the packet. Through the implementation of the self-managing system we verify its validity and show its future effect.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
K. W. Kug and S. H. Lee, "Design and Implementation of a Real Time Access Log for IP Fragmentation Attack Detection," The KIPS Transactions:PartA, vol. 8, no. 4, pp. 331-338, 2001. DOI: 10.3745/KIPSTA.2001.8.4.331.

[ACM Style]
Kyoung Wan Kug and Sang Hoon Lee. 2001. Design and Implementation of a Real Time Access Log for IP Fragmentation Attack Detection. The KIPS Transactions:PartA, 8, 4, (2001), 331-338. DOI: 10.3745/KIPSTA.2001.8.4.331.