A trust-based approach to mitigate rerouting attacks | IEEE Conference Publication | IEEE Xplore

A trust-based approach to mitigate rerouting attacks


Abstract:

One of the ways a malicious router can launch a Denial of Service (DoS) attack is by rerouting IP-packets of other destinations to the victim node. In this paper, based o...Show More
Notes: PDF Not Yet Available In IEEE Xplore. The document that should appear here is not currently available. IEEE Xplore is working to obtain a replacement PDF. That PDF will be posted as soon as it is available. We regret any inconvenience in the meantime.

Abstract:

One of the ways a malicious router can launch a Denial of Service (DoS) attack is by rerouting IP-packets of other destinations to the victim node. In this paper, based on the observed traffic anomalies, we propose using a Markov chain model to calculate trustworthiness of routers in order to isolate the malicious ones. Furthermore, our approach reduces the false positives by including context information, such as traffic congestion and packet corruption. By means of simulation, we validate our proposed approach in both connection-oriented (i.e., TCP) and connection-less (i.e., UDP) environments.
Notes: PDF Not Yet Available In IEEE Xplore. The document that should appear here is not currently available. IEEE Xplore is working to obtain a replacement PDF. That PDF will be posted as soon as it is available. We regret any inconvenience in the meantime.
Date of Conference: 15-18 October 2011
Date Added to IEEE Xplore: 02 February 2012
ISBN Information:
Conference Location: Orlando, FL, USA

Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.


Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.

Contact IEEE to Subscribe