CFP last date
20 December 2024
Reseach Article

Towards Categorization of Network Layer Attacks

by Bindu Dodiya, Umesh Kumar Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 13
Year of Publication: 2021
Authors: Bindu Dodiya, Umesh Kumar Singh
10.5120/ijca2021921312

Bindu Dodiya, Umesh Kumar Singh . Towards Categorization of Network Layer Attacks. International Journal of Computer Applications. 183, 13 ( Jul 2021), 6-11. DOI=10.5120/ijca2021921312

@article{ 10.5120/ijca2021921312,
author = { Bindu Dodiya, Umesh Kumar Singh },
title = { Towards Categorization of Network Layer Attacks },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2021 },
volume = { 183 },
number = { 13 },
month = { Jul },
year = { 2021 },
issn = { 0975-8887 },
pages = { 6-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number13/31984-2021921312/ },
doi = { 10.5120/ijca2021921312 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:16:39.967111+05:30
%A Bindu Dodiya
%A Umesh Kumar Singh
%T Towards Categorization of Network Layer Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 13
%P 6-11
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Internet connection has become very popular now a days. Connecting network to the Internet provides access to tremendous amount of information, allows sharing information on an improbable scale. However, the communal nature of the Internet, which has so many benefits, also offers malicious users easy access to numerous targets. Many people are fighting against attackers trying to find out the ways to protect the information. Currently, there are many different types of network security systems, ids, anti-virus systems, firewalls, anti malware software’s. However, these available mechanisms lack ability for defense against network attacks which uses vulnerabilities of network system. Attacks and vulnerabilities can be classified into taxonomy, and the taxonomy along with applicable methodologies can be used to predict future attacks. There are many approaches to categories vulnerabilities into taxonomy. One way is to classify by location of vulnerability in object model. These classifications attempt to categories vulnerabilities according to which model object or entity they belong to. This paper aims to categories vulnerabilities and attacks by their location in the Network Layer of ISO OSI . Attacks which happen on the network layer are many and more dangerous for the network compared with attacks of the other layers. In this Paper attacks at Network Layer has been classified by their Attack Vector and their Impact on the Attacks.

References
  1. Predictions and Trends for Information, Computer and Network Security [Online] available: http://www.sans.edu/research/security-laboratory/article/2140
  2. Pascal Meunier Technical article Wiley Handbook of Science and Technology for Homeland Security.
  3. Chris Sanders “Practical Packet Analysis Using Wireshark to solve Real-World Network Problems” 2nd Edition .
  4. Flexera’s Vulnerability Review 2020 “Global Trends Key Figures AND Facts On Vulnerability From a global Information Security Perspective” available at https://info.flexera.com/SVM-REPORT-Vulnerability-Review-2020.
  5. S.Nithya, K.VijayaLakshmi, V.PadmaPriya “A Review of Network Layer Attacks and Countermeasures in WSN” IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 6, Ver. III (Nov - Dec .2015).
  6. G.S.Mamatha ,Dr. S.C. Sharma “Network Layer Attacks and Defense Mechanisms in MANETS- A Survey” International Journal of Computer Applications (0975 – 8887)Volume 9– No.9, November 2010.
  7. Preeti sinha, Dr. V. K. Jha, Amit Kumar Rai, Bharat Bhushan” Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A Survey” International Conference on Signal Processing and Communication (ICSPC’17) – 28th & 29th July 2017
  8. Edvald Sula “A review of Network Layer and Transport Layer Attacks on Wireless Networks “ International Journal Of Modern Engineering Research (IJMER)” Vol. 8 ,Iss.12 , December 2018.
  9. Ioannou and Vasos Vassiliou (2016),“The Impact of Network Layer Attacks in Wireless Sensor Networks". 2016 International Workshop on Secure Internet of Things (SIoT), IEEE
  10. KRodriguez_OSI_Model"An Analysis of Security Mechanisms in the OSI Model
  11. http://www.veracode.com/security/spoofing-attack
  12. Leslie F. Sikos” Packet analysis for network forensics: A comprehensive survey” Forensic Science International: Digital Investigation 32 (2020) 200892
  13. https://cwe.mitre.org/
  14. C. Douligeris and A. Mitrokotsa, “DDoS Attacks and Defense Mechanisms: Classification and State-of-the-art”. Comp. Networks, vol. 44, pp. 643–66, 2004.
  15. S. Hansman and R. Hunt, “A taxonomy of network and computer attacks”. Computer and Security (2005).
  16. J. Mirkovic and P. Reiher, “A Taxonomy of DDoS Attack and DDoS Defense Mechanisms”. In ACM CCR (April 2004 ).
  17. Common Vulnerabilities and Exposures. [Online] https://www.cvedetails.com (accessed on 05/03/2021).
Index Terms

Computer Science
Information Sciences

Keywords

Network Layer Attacks