Back
 JIS  Vol.8 No.3 , July 2017
Do ICMP Security Attacks Have Same Impact on Servers?
Abstract: There are different types of Cyber Security Attacks that are based on ICMP protocols. Many ICMP protocols are very similar, which may lead security managers to think they may have same impact on victim computer systems or servers. In this paper, we investigate impact of different ICMP based security attacks on two popular server systems namely Microsoft’s Windows Server and Apple’s Mac Server OS running on same hardware platform, and compare their performance under different types of ICMP based security attacks.
Cite this paper: Gunnam, G. and Kumar, S. (2017) Do ICMP Security Attacks Have Same Impact on Servers?. Journal of Information Security, 8, 274-283. doi: 10.4236/jis.2017.83018.
References

[1]   Kumar, S. and Gade, R. (2015) Windows 2008 vs. Windows 2003: Evaluation of Microsoft’s Windows Servers under Cyber Attacks. Journal of Information Security.

[2]   Kumar, S., Valdez, R. and Gomez, O. (2006) Survivability Evaluation of Wireless Sensor Networks under DDoS Attack. International Conference on Networking.
https://doi.org/10.1109/ICNICONSMCL.2006.205

[3]   Kumar, S. (2005) Impact of Distributed Denial of Service (DDoS) Attack Due to ARP-Storm. The Lecture Notes in Computer Science-Book Series-LNCS-3421-Networking-ICN 2005, Part-II, Vol. 3421, 997-1002.
https://doi.org/10.1007/978-3-540-31957-3_113

[4]   Kumar, S. and Sekhar, R. (2011) Experimental Evaluation of Juniper Network’s Netscreen-5GT Security Device against Layer4 Flood Attacks. Journal of Information Security, 2, 50-58.
https://doi.org/10.4236/jis.2011.21005

[5]   Vellalacheruvu, H.K. and Kumar, S. (2011) Effectiveness of Built-In Security Protection of Microsoft’s Windows Server 2003 against TCP SYN Based DDoS Attacks. Journal of Information Security, 2, 131-138.
https://doi.org/10.4236/jis.2011.23013

[6]   Gade, R.S.R., Vellalacheruvu, H. and Kumar, S. (2010) Performance of Windows XP, Windows Vista and Apple’s Leopard Systems under a DDoS Attack. International Conference on Digital Society (ICDS’10).

[7]   Surisetty, S. and Kumar, S. (2012) Microsoft’s Windows7 vs. Apple’s Snow Leopard: An Experimental Evaluation of Resilience against Distributed Denial of Service (DDoS) Attacks. IEEE Security and Privacy, 10, 60-64.

[8]   Baez Jr., R. and Kumar, S. (2014) Apple’s Lion vs. Microsoft’s Windows 7: Comparing Built-In Protection against ICMP Flood Attacks. Journal of Information Security, 5, 123-135.
https://doi.org/10.4236/jis.2014.53012

[9]   Sundar, K. and Kumar, S. (2016) BlueScreen of Death Observed for the Microsoft’s Server 2012 R2 under Denial of Service Attacks. Journal of Information Security, 7, 225-231.
https://doi.org/10.4236/jis.2016.74018

[10]   Surisetty, S. and Kumar, S. (2010) Is Apple’s iMac Leopard Operating System Secure under ARP-Based Flooding Attacks? Second International Conference on Internet Monitoring and Protection (ICIMP 2010).
https://doi.org/10.1109/ICIMP.2010.30

[11]   Kumar, S. and Surishetty, S. (2011) Apple’s Leopard versus Microsoft’s Windows XP: Experimental Evaluation of Apple’s Leopard Operating System with Windows XP-SP2 under Distributed Denial of Service Security Attacks. Information Security Journal: A Global Perspective, 20, 163-172.

[12]   Aishwarya, R. and Malliga, S. (2014) Intrusion Detection System—An Efficient Way to Thwart against Dos/DDoS Attack in the Cloud Environment. International Conference on Recent Trends in Information Technology, Chennai, 10-12 April 2014, 1-6.

[13]   Kumar, S. (2007) Smurf-Based Distributed Denial of Service (DDoS) Attack Amplification in Internet. 2nd International Conference on Internet Monitoring and Protection (ICIMP), San Jose, 1-5 July 2007, 25.

[14]   Kumar, S. (2006) PING Attack—How Bad Is It. Computers & Security, 25, 332-337.

[15]   Smurf Attack.
http://en.wikipedia.org/wiki/Smurf_attack

[16]   Ferguson, P. and Senie, D. (2000) Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing. RFC 2827, BCP 38.

[17]   Mac Pro (2010) Technical Specifications.
http://support.apple.com/kb/SP589?locale=en_US

[18]   Solid-State Drive Replacement Instructions for Mac Pro.
http://manuals.info.apple.com/MANUALS/1000/MA1548/en_US/Mac_Pro_SSD_DIY.pdf

[19]   Apple Statement on Core Distribution.
http://support.apple.com/en-us/HT201838

 
 
Top