Detecting compromised routers via packet forwarding behavior
نویسندگان
چکیده
منابع مشابه
Don’t Trust Your Router: Detecting Compromised Routers
Safeguarding one’s router has received very little attention despite a plethora of router-specific malware, which has emerged recently. Here, we propose a systematic approach to distinguish a router infected by malware from a healthy router. Our key novelty is that we analyze the behavior of the router, thus not relying on binary signatures (like anti-virus software for computers). Our contribu...
متن کاملHardware-Assisted Design for Fast Packet Forwarding in Parallel Routers
A hardware-assisted design, dubbed cache-oriented multistage structure (COMS), is proposed for fast packet forwarding. COMS incorporates small on-chip cache memory in its constituent switching elements (SE’s) for a parallel router to interconnect its line cards (LC’s) and forwarding engines (FE’s, where table lookups are performed). Each lookup result in COMS is cached in a series of SE’s betwe...
متن کاملParallel IP Packet Forwarding for Tomorrow’s IP Routers
The invention and evolution of the Dense Wavelength Division Multiplexing (DWDM) technology has brought a breakthrough to high-speed networks, and it has put a lot of pressure on research in the area of IP routers to catch up. Besides, with up-coming Quality of Service (QoS) requirements raised by a wide range of communication-intensive, real-time multimedia applications, the next-generation IP...
متن کاملCentralized Failure Detector via Active Replication
While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well appreciated that Internet routers are also being actively targeted and compromised. Indeed, due to its central role in end-to-end communication, a compromised router can be leveraged to empower a wide range of direct atta...
متن کاملPacket Forwarding Using Xen
Network virtualization allows the development of systems with several virtual routers (VR) over the same physical router. Each virtual router can execute, at the same time, different protocol stacks without disrupting the coexisting routers. The main purpose of this work is to analyze Xen capabilities and limitations and compare its efficiency with native solutions. Tests are performed in order...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Network
سال: 2008
ISSN: 0890-8044
DOI: 10.1109/mnet.2008.4476069