Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mitko Bogdanoski is active.

Publication


Featured researches published by Mitko Bogdanoski.


telecommunications forum | 2012

Wireless Local Area Network Behavior under RTS Flood DoS attack

Peco Stojanoski; Mitko Bogdanoski; Aleksandar Risteski

Wireless Local Area Networks (WLANs) are subject to different types of vulnerabilities. Denial of Service (DoS) attacks are among the most challenging issues regarding WLANs. In this paper, we present our approach to simulate the RTS flood DoS attack, and to analyze the effects of this attack on IEEE 802.11 WLANs. OPNET Modeler 14.5 advanced network simulator is used to simulate this type of attack.


ieee eurocon | 2017

Security and QoS framework for 5G and next generation mobile broadband networks

Tomislav Shuminoski; Toni Janevski; Aleksandar Risteski; Mitko Bogdanoski

This paper presents an advanced Security QoS provisioning module with vertical multi-homing and multi-streaming framework for 5G mobile terminals with radio network aggregation capability in next generation mobile and wireless broadband networks. The proposed mobile terminal framework is leading to high performance opportunities for multimedia services with high level of QoS provisioning and secure communications. It is using vertical multi-homing and multi-streaming features with IPSec encapsulations within the mobile equipments, which are able to handle simultaneously multiple radio network secure connections and speed up the transfer of the multimedia services by transmitting each object in a separate stream, achieving high level of QoS and security provisioning. Our proposed model is user-centric, targeted to always-on connectivity, maximal network throughput, with ability to provide various multimedia services with high level of security and confidentiality. The performance of the proposed framework is evaluated though simulations and analysis with multimedia traffic in Next Generation Mobile broadband scenarios with coexistence of multiple heterogeneous radio access technologies, such as existing and future (5G) mobile broadband networks.


Mobile Networks and Applications | 2017

Analysis of the Impact of AuthRF and AssRF Attacks on IEEE 802.11e-based Access Point

Mitko Bogdanoski; Pero Latkoski; Aleksandar Risteski

This paper analyzes several Denial of Service (DoS) attacks at Medium Access Control (MAC) level, with an emphasis on the attacks related to authentication and association mechanisms in WLANs. In particular, a detailed analytical model is presented based on IEEE 802.11e access point (AP) queuing model, which shows the impact of the authentication and association flooding attacks. Using the proposed queuing model, the paper discusses the differences in behavior of APs based on both IEEE 802.11 and IEEE 802.11e standards, under DoS attacks. The analytical model is further extended in order to tackle the 802.11e AP behavior, followed by appropriate quantitative results for different types of Authentication Request Flooding (AuthRF) and Association Request Flooding (AssRF) DoS attacks. More specific, the paper analyzes the AP behavior being under AuthRF DoS attacks with three different levels of attack intensity: Low Level (LL), Medium Level (ML) and High Level (HL), at the same time assuming different traffic priorities. The analysis reveals that during the attack, the implemented algorithm plays a significant role in the overall performance. Namely, if an appropriate model is applied during LL and ML DoS attacks, the high priority traffic will be less affected, providing it with an opportunity to be served with significantly lower losses compared to the low priority traffic. The proposed queuing model and the developed analytical approach can be also used for each protocol layer, especially if the attacks involve flooding with too many requests (ICMP, TCP SYN, UDP etc.). The last part of the paper provides a comprehensive survey of different mechanisms used to mitigate the effects of the DoS attacks on MAC sublayer.


Archive | 2016

Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare

Metodi Hadji-Janev; Mitko Bogdanoski

As the confluence of networks that is the modern Internet grows to encompass everything from nuclear reactors to home appliances, the affordances offered to the average citizen grow as well—but so, too, do the resources made available to those with malicious intent. Through the rise of Big Data and the Internet of Things, terrorist organizations today have been freed from geographic and logistical confines and now have more power than ever before to strike the average citizen directly at home. This, coupled with the inherently asymmetrical nature of cyberwarfare—which grants great advantage to the attacker—has created an unprecedented national security risk that both governments and their citizens are woefully ill-prepared to face. The Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare addresses the problem of cyber terrorism head-on, first through a review of current literature, and then through a series of progressive proposals aimed at researchers, professionals, and policymakers. Touching on such subjects as cyber-profiling, hacktivism, and digital counterterrorism, this collection offers the tools to begin formulating a ground-up resiliency to cybersecurity threats that starts at the civilian level.


Future Access Enablers of Ubiquitous and Intelligent Infrastructures | 2015

The Terrorist Threat to the Critical Information Infrastructure in South East Europe

Metodi Hadji-Janev; Mitko Bogdanoski

The rise of ICT (Information and Communication Technologies) in the age of globalization significantly affects SEE (South Eastern European) security. Although these technologies help the region of SEE to become more interconnected, interrelated and thus, boost the SEE countries’ commodity, prosperity and competitiveness put in security context, these technologies have increased unpredictability, complexity and the threats to the SEE security. In this line, as to the rest of the world, modern terrorism represents an inevitable burden of the SEE governments’ security. Today, it is more than clear that modern terrorist groups and individuals exploit cyberspace to achieve strategic advantage against the mightier enemies. Therefore, based on the recent experience the article explains how and in which way terrorist use of a cyberspace could affect CII (critical information infrastructure) in the region of SEE. Giving the specific dynamics in the region, article first explains how terrorists’ use of modern ICT and cyberspace serves to accomplish their strategic agenda. Then it explains how terrorist could affect CIIs in the region of SEE and thus affect the overall SEE regions’ security.


Future Access Enablers of Ubiquitous and Intelligent Infrastructures | 2015

An Analysis of the Impact of the AuthRF and AssRF Attacks on IEEE 802.11e Standard

Mitko Bogdanoski; Pero Latkoski; Aleksandar Risteski

The paper shows detailed analysis of the effects of the AuthRF (Authentication Request Flooding) and AssRF (Association Request Flooding) MAC Layer DoS (Denial of Service) attacks on 802.11e wireless standard based on a proposed queuing model. More specific, the paper analyzes the Access Point (AP) behavior under AuthRF DoS attacks with different frequency of the requests arrival, i.e. Low Level (LL), Medium Level (ML) and High Level (HL), at the same time considering different traffic priorities. The proposed queuing model and the developed analytical approach can be also used on each protocol layer, especially if the attacks are seen in terms of the flooding influence over AP with too many requests (ICMP, TCP SYN, UDP etc.).


Future Access Enablers of Ubiquitous and Intelligent Infrastructures | 2015

Simulation Analysis of DoS, MITM and CDP Security Attacks and Countermeasures

Biljana Tanceska; Mitko Bogdanoski; Aleksandar Risteski

In this paper, an analysis of security attacks on network elements along with the appropriate countermeasures is presented. The network topology that has been attacked is designed in GNS3 software tool installed on Windows operating system, while the attacks are performed in Kali Linux operating system. Three groups of security attacks (Denial of Service, Man in the Middle, and Control Plane attacks) are observed in simulation scenarios with a detailed analysis on each of them, followed by a presentation of practical performance and ways of prevention (protection) against the attacks.


computational intelligence communication systems and networks | 2014

Power Control as an Effective Method against Low Power Jamming

Mitko Bogdanoski; Aleksandar Risteski; Pero Latkoski; Tomislav Shuminoski

Wireless networks are built upon a shared medium which makes it easy for an adversary to launch a Denial of Service (DoS) attack. Jamming, as a part of DoS attacks at physical layer, is one of the main security considerations within the wireless networks. It holds the potential to totally cripple the network and cause a loss of service and revenue. Jamming attacks can severely interfere with the normal operation of wireless networks and, consequently, mechanisms are needed that can cope with jamming attacks. Jamming techniques vary from simple ones based on the continual transmission of interference signals, to more sophisticated attacks that aim at exploiting vulnerabilities of the particular used protocol. Considering the fact that the jamming is one of most common attacks against military communications, this paper is examining the wireless military network behavior in the presence of such attacks. For this purpose we simulate the effects of the various jamming attacks using OPNET Modeler. Several effective counter-measures against low power jamming are proposed. These measures are based on both transmit power and packet reception power threshold optimization, supported by spread spectrum techniques. The results are considerably improved when all of these mechanisms are combined.


International Journal of Computer Network and Information Security | 2013

Analysis of the SYN Flood DoS Attack

Mitko Bogdanoski; Tomislav Shuminoski; Aleksandar Risteski


Archive | 2008

IEEE 802.16 Security Issues: A Survey

Mitko Bogdanoski; Pero Latkoski; Aleksandar Risteski; Borislav Popovski

Collaboration


Dive into the Mitko Bogdanoski's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Biljana Tanceska

United Kingdom Ministry of Defence

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Slavche Pejoski

Information Technology University

View shared research outputs
Top Co-Authors

Avatar

Toni Janevski

Information Technology University

View shared research outputs
Researchain Logo
Decentralizing Knowledge