Abstract:
One of the ways a malicious router can launch a Denial of Service (DoS) attack is by rerouting IP-packets of other destinations to the victim node. In this paper, based o...Show MoreNotes: PDF Not Yet Available In IEEE Xplore. The document that should appear here is not currently available. IEEE Xplore is working to obtain a replacement PDF. That PDF will be posted as soon as it is available. We regret any inconvenience in the meantime.
Metadata
Abstract:
One of the ways a malicious router can launch a Denial of Service (DoS) attack is by rerouting IP-packets of other destinations to the victim node. In this paper, based on the observed traffic anomalies, we propose using a Markov chain model to calculate trustworthiness of routers in order to isolate the malicious ones. Furthermore, our approach reduces the false positives by including context information, such as traffic congestion and packet corruption. By means of simulation, we validate our proposed approach in both connection-oriented (i.e., TCP) and connection-less (i.e., UDP) environments.
Notes: PDF Not Yet Available In IEEE Xplore. The document that should appear here is not currently available. IEEE Xplore is working to obtain a replacement PDF. That PDF will be posted as soon as it is available. We regret any inconvenience in the meantime.
Published in: 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)
Date of Conference: 15-18 October 2011
Date Added to IEEE Xplore: 02 February 2012
ISBN Information:
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Author Keywords
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Author Keywords