Please use this identifier to cite or link to this item:
https://idr.l1.nitk.ac.in/jspui/handle/123456789/7685
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Patil, R. | |
dc.contributor.author | Tahiliani, M.P. | |
dc.date.accessioned | 2020-03-30T10:02:38Z | - |
dc.date.available | 2020-03-30T10:02:38Z | - |
dc.date.issued | 2014 | |
dc.identifier.citation | 1st International Conference on Networks and Soft Computing, ICNSC 2014 - Proceedings, 2014, Vol., , pp.113-118 | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/7685 | - |
dc.description.abstract | The next generation Internet supports dynamic deployment of different protocols and heterogeneous applications. To support this, routers in next generation computer networks use general purpose programmable packet processors. The customization of routers introduces increased vulnerabilities and attacks that allow potential attackers to compromise the router. Since network routers play a key role in todays network data transport, they became an interesting targets for attackers. An attacker can mount different attacks like denial-of-service or man-in-the-middle by intelligently dropping, modifying or diverting packets arriving at a compromised router. In this paper, we considered the problem of detecting packet modification attack which is performed by an attacker through misbehaving router. Since it is necessary to differentiate malicious packet modification from regular packet modification, detecting such an attack is challenging task. We proposed a controller-based packet modification misbehavior detection technique that excellently detects malicious packet modification by using a hash-based comparison of incoming and outgoing packets of the router. Experiments were carried out using Mininet Simulator and based on the results obtained, we observe that our proposed technique unambiguously detects the malicious packet modification. � 2014 IEEE. | en_US |
dc.title | Detecting packet modification attack by misbehaving router | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.