Detecting compromised routers via packet forwarding behavior
dc.citation.epage | 39 | en_US |
dc.citation.issueNumber | 2 | en_US |
dc.citation.spage | 34 | en_US |
dc.citation.volumeNumber | 22 | en_US |
dc.contributor.author | Mizrak, A.T. | en_US |
dc.contributor.author | Savage, S. | en_US |
dc.contributor.author | Marzullo, K. | en_US |
dc.date.accessioned | 2016-02-08T10:10:09Z | |
dc.date.available | 2016-02-08T10:10:09Z | |
dc.date.issued | 2008 | en_US |
dc.department | Department of Computer Engineering | en_US |
dc.description.abstract | While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well appreciated that Internet routers are also being actively targeted and compromised. Indeed, due to its central role in end-to-end communication, a compromised router can be leveraged to empower a wide range of direct attacks including eavesdropping, man-in-the-middle subterfuge, and denial of service. In response, a range of specialized anomaly detection protocols has been proposed to detect misbehaving packet forwarding between routers. This article provides a general framework for understanding the design space of this work and reviews the capabilities of various detection protocols. © 2008 IEEE. | en_US |
dc.identifier.doi | 10.1109/MNET.2008.4476069 | en_US |
dc.identifier.issn | 0890-8044 | en_US |
dc.identifier.uri | http://hdl.handle.net/11693/23193 | en_US |
dc.language.iso | English | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1109/MNET.2008.4476069 | en_US |
dc.source.title | IEEE Network | en_US |
dc.subject | Computer crime | en_US |
dc.subject | Network protocols | en_US |
dc.subject | Network security | en_US |
dc.subject | Packet networks | en_US |
dc.subject | Denial of service | en_US |
dc.subject | Detection protocols | en_US |
dc.subject | End-to-end communication | en_US |
dc.subject | Packet forwarding | en_US |
dc.subject | Routers | en_US |
dc.title | Detecting compromised routers via packet forwarding behavior | en_US |
dc.type | Article | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Detecting compromised routers via packet forwarding behavior.pdf
- Size:
- 109.6 KB
- Format:
- Adobe Portable Document Format
- Description:
- Full printable version