Detecting disruptive routers: a distributed network monitoring approach

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Disruptive Routers: A Distributed Network Monitoring Approach

An attractive target for a computer system attacker is the router. An attacker in control of a router can disrupt communication by dropping or misrouting packets passing through the router. We present a protocol called WATCHERS that detects and reacts to routers that drop or misroute packets. WATCHERS is based on the principle of conservation of ow in a network: all data bytes sent into a node,...

متن کامل

A Distributed MAC Scheme for Large Network of Wireless Routers

For army, the mobility of an entire communication network is desirable. A large mobile communication network inevitably involves a large network of wireless routers. The throughput of a large network of wireless routers critically depends on distributed medium access control (MAC). In this paper, we present a MAC scheme to be called opportunistic synchronous array method (OSAM). The O-SAM is di...

متن کامل

A probabilistic approach to detecting network scans

This paper presents a probabilistic approach for detecting network scans in real-time. Unlike previous approaches, our model takes into consideration both the number of destinations or ports accessed by a source, as well as how unusual these accesses are. We demonstrate the effectiveness of our approach in terms of accuracy and throughput, based on an analysis of the unusual sources that were f...

متن کامل

Detecting Network Intrusions ­a Clustering Approach

With the increased usage of computer networks, security becomes a critical issue. Recently, data mining methods have gained lot of attention in addressing network security issues, including intrusion detection. Consequently, unsupervised learning methods have been given much importance for anomaly based network intrusion detection. In this paper, we investigate new clustering algorithms like fa...

متن کامل

Don’t Trust Your Router: Detecting Compromised Routers

Safeguarding one’s router has received very little attention despite a plethora of router-specific malware, which has emerged recently. Here, we propose a systematic approach to distinguish a router infected by malware from a healthy router. Our key novelty is that we analyze the behavior of the router, thus not relying on binary signatures (like anti-virus software for computers). Our contribu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Network

سال: 1998

ISSN: 0890-8044

DOI: 10.1109/65.730751