Design and Implementation of a Real Time Access Log for IP Fragmentation Attack Detection 


Vol. 8,  No. 4, pp. 331-338, Dec.  2001
10.3745/KIPSTA.2001.8.4.331


PDF
  Abstract

With the general use of network, cyber terror rages throughout the world. However, IP Fragmentation isn't free from its security problem yet, even though it guarantees effective transmission of the IP package in its network environment. Illegal invasion could happen or disturb operation of the system by using attack mechanism such as IP Spoofing, Ping of Death, or ICMP taking advantage of defectiveness, if any, which IP Fragmentation needs improving. Recently, apart from service refusal attack using IP Fragmentation, there arises a problem that it is possible to detour packet filtering equipment or network-based attack detection system using IP Fragmentation. In the paper, we generate the real time access log file to make the system manager help decision support and to make the system manage itself in case that some routers or network-based attack detection systems without packet reassembling function could not detect or suspend illegal invasion with divided datagrams of the packet. Through the implementation of the self-managing system we verify its validity and show its future effect.

  Statistics


  Cite this article

[IEEE Style]

K. W. Kug and S. H. Lee, "Design and Implementation of a Real Time Access Log for IP Fragmentation Attack Detection," The KIPS Transactions:PartA, vol. 8, no. 4, pp. 331-338, 2001. DOI: 10.3745/KIPSTA.2001.8.4.331.

[ACM Style]

Kyoung Wan Kug and Sang Hoon Lee. 2001. Design and Implementation of a Real Time Access Log for IP Fragmentation Attack Detection. The KIPS Transactions:PartA, 8, 4, (2001), 331-338. DOI: 10.3745/KIPSTA.2001.8.4.331.