CFP last date
20 May 2024
Reseach Article

Protection against Denial of Service in Automation Systems

by Farag M. Afify, Hamdy M. Kelash, Osama S. Faragallah, Maha S. Tolba, Hala S. El-sayed
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 106 - Number 18
Year of Publication: 2014
Authors: Farag M. Afify, Hamdy M. Kelash, Osama S. Faragallah, Maha S. Tolba, Hala S. El-sayed
10.5120/18704-9595

Farag M. Afify, Hamdy M. Kelash, Osama S. Faragallah, Maha S. Tolba, Hala S. El-sayed . Protection against Denial of Service in Automation Systems. International Journal of Computer Applications. 106, 18 ( November 2014), 11-18. DOI=10.5120/18704-9595

@article{ 10.5120/18704-9595,
author = { Farag M. Afify, Hamdy M. Kelash, Osama S. Faragallah, Maha S. Tolba, Hala S. El-sayed },
title = { Protection against Denial of Service in Automation Systems },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 106 },
number = { 18 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 11-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume106/number18/18704-9595/ },
doi = { 10.5120/18704-9595 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:39:53.052573+05:30
%A Farag M. Afify
%A Hamdy M. Kelash
%A Osama S. Faragallah
%A Maha S. Tolba
%A Hala S. El-sayed
%T Protection against Denial of Service in Automation Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 106
%N 18
%P 11-18
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Denial of service (Dos) problem has great impact on all devices in automation system. A lot of techniques have been developed that can protect systems from Dos attack. This paper presents some proposal solutions to solve this problem in order to decrease the risk factor by Using Trusted Authentication Device, Counter, and connecting the network with two routers. The first router is the basic and the other one is reserve. Then, dividing the devices into normal and vip devices, connecting vip devices with two networks, Trust Point (TP) to prevent attackers from access to AS and the optimal solution mixing between the previous ones.

References
  1. Madhuri H. Bhagwat, Amol P. Pande, "Denial of Service Mitigation Method" , Department of Computer Engineering, Datta Meghe College of Engineering, Airoli, Maharashtra, 2013
  2. MEHMUD ABLIZ, "Internet Denial of Service Attacks and Defense Mechanisms" Department of Computer Science, University of Pittsburgh Technical Report, No. TR-11-178, March 2011.
  3. Karimazad, R. and Faraahi, A. an anomaly based method for DDoS attacks detection using rbf neural networks. Proceedings of the International Conference on Network and Electronics Engineering, Singapore, pp. 44–48. IACSIT Press, 2011.
  4. Xiang, Y. , Li, K. , and Zhou, W. Lowrate DDoS attacks detection and traceback by using new information metrics. IEEE Transactions on Information Forensics and Security, 2011, 6, 426–437.
  5. Loukas, G. and ¨Oke, G. Protection against denial of service attacks: A survey. Comp. J. , 53, 2010, 1020– 1037.
  6. Wolfgang Granzer, Christian Reinisch, Wolfgang Kastner "Denial-of-Service in Automation Systems" Vienna University of Technology, Automation Systems Group, 1-4244-1506-3/08 2008 IEEE.
  7. Guide to Industrial Control Systems (ICS) Security. NIST SP800-82, 2007. Second Public Review Draft.
  8. Pravin Shinde, Srinivas Guntupalli "Early DoS Attack Detection using Smoothened Time-Series and Wavelet Analysis" CDAC, Mumbai, 0-7695-2876-7/07 2007 IEEE.
  9. Karen Scarfone, Peter Mell "Guide to Intrusion Detection and Prevention Systems (IDPS)" National Institute of Standards and Technology, 2007.
  10. Guide to Industrial Control Systems (ICS) Security. NIST SP800-82, 2007. Second Public Review Draft.
  11. Power System Control and Associated Communications Data and Communication Security. IEC 62351, 2007.
  12. Monowar H. Bhuyan1, H. J. Kashyap1, D. K. Bhattacharyya1 and J. K. Kalita2 "Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions" 2Department of Computer Science, University of Colorado at Colorado Springs, CO 80933-7150, USA.
  13. Josep L. Berral, Nicolas Poggi, Javier Alonso, Ricard Gavald`a, Jordi Torres, Manish Parashar "Adaptive Distributed Mechanism against Flooding Network Attacks Based on Machine Learning" Computer Architecture Dept. , Deptartment of Software, Technical University of Catalonia , Dept. of Electrical and Computer Engineering, Rutgers University.
  14. Frank Kargl, Joern Maier, Michael Weber "Protecting Web Servers from Distributed Denial of Service Attacks" Department of Multimedia Computing, University of Ulm, Germany, May 1-5, 2001, Hong Kong. ACM 1-58113-348-0/01/0005.
Index Terms

Computer Science
Information Sciences

Keywords

Automation Systems Trusted authentication device trusted point Counter Monitoring the Source IP addresses and network topology.