Amplification-based Attack Models for Discontinuance of Conventional Network Transmissions

Full Text (PDF, 790KB), PP.15-22

Views: 0 Downloads: 0


Mina Malekzadeh 1,* Moghis Ashrostaghi 2 M.H. Shahrokh Abadi 1

1. Faculty of Electrical and Computer Engineering, Hakim Sabzevari University Sabzevar, Iran

2. Engineering Faculty of Golestan University, Gorgan, Iran

* Corresponding author.


Received: 25 Jul. 2015 / Revised: 5 Sep. 2015 / Accepted: 3 Oct. 2015 / Published: 8 Nov. 2015

Index Terms

Amplification-based attacks, DDoS, Smurf attacks, Fraggle attacks NS2


Amplification attacks take advantage of insecurity of different OSI layers. By targeting broadcast address of the victim networks and sending a few packets by the attackers, they force the legitimate user in the victim networks to response to these packets and attack their own trusted networks unknowingly. Despite importance of amplification attacks, there is not any work to implement these attacks to identify their procedure and quantify and compare their impacts on the networks. In this work, we use NS2 to achieve these goals. A variety range of scenarios are designed to implement DDoS amplification attacks and collect the results in terms of different network performance measures. The quantitative results prove devastating impact of the attacks which are easily capable of rendering the target wireless networks disable for their legitimate users. 

Cite This Paper

Mina Malekzadeh, Moghis Ashrostaghi, M.H. Shahrokh Abadi, "Amplification-based Attack Models for Discontinuance of Conventional Network Transmissions", International Journal of Information Engineering and Electronic Business(IJIEEB), vol.7, no.6, pp.15-22, 2015. DOI:10.5815/ijieeb.2015.06.03


[1]V. BOCAN. Developments in DoS Research and Mitigating Technologies, Transactions on Automatic Control And Computer Science, 2004, Vol.49, No.63, PP.1-6.

[2]C. Douligeris and A.Mitrokotsa. DDoS attacks and defense mechanisms: classification and state-of-the-art, 2004, Elsevier Computer Networks, PP. 643–666.

[3]S.T.Zargar, J.Joshi, D.Tipper. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks, 2013, IEEE Communications Surveys & Tutorials, PP.1-24.

[4]M.Kumar and N.Kumar. Detection and prevention of ddos attack in manet's using disable ip broadcast technique, 2013, International Journal of Application or Innovation in Engineering & Management (IJAIEM), vol.2, No.7, PP.29-36.

[5]A.Vince Paual , P. Anuranj, K. Prasadh. Enhanced Attack Resistance Scheme for App-DDoS Attacks using Bayes Optimal Filter Strategy, International Journal of Computer Applications, 2012, PP.14-18. 

[6]H.C. Chaudhari and L.U. Kadam. Wireless Sensor Networks: Security, Attacks and Challenges, International journal of networking, Vol.1, No.1, pp.4-16, 2011.

[7]C.M. Pate and V.H. Borisagar. Survey On Taxonomy Of DDoS Attacks With Impact And Mitigation Techniques, International Journal of Engineering Research & Technology (IJERT), Vol.1, No.9, pp.1-8, 2012.

[8]K. Choudhary, Meenakshi, and Shilpa. Smurf Attacks: Attacks using ICMP, International Journal of Computer Science and Technology (IJCST), Vol.2, No.1, pp.75-77, 2011.

[9]N.Ahmed, Z.I.A.Khalib, R.B.Ahmad, S.Sudin, S.Asi, Y.Laalaoui. Low-End Embedded Linux Platform for Network Security Application – Smurf Based Attack Detection, 2008, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.11, PP.1-7.

[10]D.Kale and V.Bhosale. Scrutiny of DDoS Attacks Defense Mechanisms, International Journal of Advanced Research in Computer Science & Technology, 2014, Vol.2, No.1, PP.154-157. 

[11]D.G.Kumar, C. V. Guru Rao, A.Gopal J, and P.Mohan. Distributed DoS Attacks: Classification and Defense Mechanisms, 2013, PP.703-708.