Skip to main content

Network Analysis of ICMP Ping Flood DoS Attack in WiMAX and Wireless LAN

  • Conference paper
  • First Online:
Proceedings of International Conference on ICT for Sustainable Development

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 409))

  • 1460 Accesses

Abstract

Sharing of data over the wireless network is an important activity in today’s world. A malicious user may try blocking a service or intercept data. Such attacks on network are termed as denial-of-service attack. Due to the broadcast nature of wireless communication, exploitation of this kind of attack is even easier. That is why, security is a very critical issue in e-business. It is often impossible to measure its effectiveness in real life because of the network administrators’ fears or prejudice. But before measuring its effectiveness and developing mitigation methods, it is important to understand the how such attacks actually works and we should have full knowledge about their characteristics and their impacts. In this paper, we present our approach to simulate the ICMP Ping Flood attack in WiMax and wireless LAN and to analyze the effects of this attack on wireless networks using OPNET Modeler.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Garantla, H. Evaluation of firewall effects on network performance.

    Google Scholar 

  2. Bogdanoski, M. Wireless network behavior under ICMP ping flood DoS attack and mitigation techniques.

    Google Scholar 

  3. Elleithy, K. M. Denial of service attack techniques: Analysis, implementation and comparison, systemics, cybernetics and informatics (Vol. 3). ISSN:1690-4524.

    Google Scholar 

  4. http://arstechnica.com/security/news/2008/05/phlashing-attacks-could-render-networkhardware-useless.ars

  5. Bhatti, G. (March 2013). A meliorated defense mechanism for flooding based attacks. International Journal of Soft Computing and Engineering (IJSCE), 3(1). ISSN:2231-2307.

    Google Scholar 

Download references

Acknowledgments

I am really grateful to my mother for this paper. It may not be possible to complete my paper without her guidance and valuable support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anu Raheja .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Raheja, A., Singh, A. (2016). Network Analysis of ICMP Ping Flood DoS Attack in WiMAX and Wireless LAN. In: Satapathy, S., Joshi, A., Modi, N., Pathak, N. (eds) Proceedings of International Conference on ICT for Sustainable Development. Advances in Intelligent Systems and Computing, vol 409. Springer, Singapore. https://doi.org/10.1007/978-981-10-0135-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0135-2_10

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0133-8

  • Online ISBN: 978-981-10-0135-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics