Detecting disruptive routers: a distributed network monitoring approach
نویسندگان
چکیده
منابع مشابه
Detecting Disruptive Routers: A Distributed Network Monitoring Approach
An attractive target for a computer system attacker is the router. An attacker in control of a router can disrupt communication by dropping or misrouting packets passing through the router. We present a protocol called WATCHERS that detects and reacts to routers that drop or misroute packets. WATCHERS is based on the principle of conservation of ow in a network: all data bytes sent into a node,...
متن کاملA Distributed MAC Scheme for Large Network of Wireless Routers
For army, the mobility of an entire communication network is desirable. A large mobile communication network inevitably involves a large network of wireless routers. The throughput of a large network of wireless routers critically depends on distributed medium access control (MAC). In this paper, we present a MAC scheme to be called opportunistic synchronous array method (OSAM). The O-SAM is di...
متن کاملA probabilistic approach to detecting network scans
This paper presents a probabilistic approach for detecting network scans in real-time. Unlike previous approaches, our model takes into consideration both the number of destinations or ports accessed by a source, as well as how unusual these accesses are. We demonstrate the effectiveness of our approach in terms of accuracy and throughput, based on an analysis of the unusual sources that were f...
متن کاملDetecting Network Intrusions a Clustering Approach
With the increased usage of computer networks, security becomes a critical issue. Recently, data mining methods have gained lot of attention in addressing network security issues, including intrusion detection. Consequently, unsupervised learning methods have been given much importance for anomaly based network intrusion detection. In this paper, we investigate new clustering algorithms like fa...
متن کاملDon’t Trust Your Router: Detecting Compromised Routers
Safeguarding one’s router has received very little attention despite a plethora of router-specific malware, which has emerged recently. Here, we propose a systematic approach to distinguish a router infected by malware from a healthy router. Our key novelty is that we analyze the behavior of the router, thus not relying on binary signatures (like anti-virus software for computers). Our contribu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Network
سال: 1998
ISSN: 0890-8044
DOI: 10.1109/65.730751