نتایج جستجو برای: routing attacks

تعداد نتایج: 109208  

2015
Yixin Sun Anne Edmundson Laurent Vanbever Oscar Li Jennifer Rexford Mung Chiang Prateek Mittal

The Tor network is a widely used system for anonymous communication. However, Tor is known to be vulnerable to attackers who can observe traffic at both ends of the communication path. In this paper, we show that prior attacks are just the tip of the iceberg. We present a suite of new attacks, called Raptor, that can be launched by Autonomous Systems (ASes) to compromise user anonymity. First, ...

2003
Markus Jakobsson Susanne Wetzel Bülent Yener

We study two classes of attacks that can be mounted by manipulation of routing information and exhaustive power consumption. Our attacks allow an attacker to partition a network, reduce its goodput, hi-jack and filter traffic from and to victim nodes, and thereby eavesdrop and perform traffic analysis. The methods described are ”stealth attacks” in that they minimize the cost to and visibility ...

2009
Soo Young Moon Tae Ho Cho

Wireless Sensor Networks (WSNs) detect and report interesting events when they occur in the target region. These networks are vulnerable to security breach due to wireless communication and lack of infrastructure. In sinkhole attacks, an attacker attracts network traffic by forging or replaying routing messages through compromised nodes. Thus attracted traffic is used for selective forwarding, ...

Journal: :IJDSN 2013
Aly Mohamed El-Semary Mohamed Mostafa Abdel-Azim

Recently,Wireless SensorNetworks (WSNs) have been deployed into a variety of applications including homeland security, military systems, and health care. Sensor nodes deployed in such networks are subject to several attacks such as sinkhole and select forwarding, wormhole, Hello flood, and replication attacks. Therefore, developing secure and energy-efficient routing protocols to protect WSNs a...

2014
Soram Rakesh Singh

Wireless ad-hoc sensor networks and routing data in them is a significant research area. The objective of this paper is to examine resource depletion attacks at the routing protocol layer, which attempts to permanently disable network nodes by quickly draining their battery power. This type of attack is called as vampire attack. Vampire attacks are very difficult to detect because they attack t...

2010
Lata L. Ragha B. B. Bhaumik S. K. Mukhopadhyay

The current interdomain routing protocol, Border Gateway Protocol, is limited in implementations of universal security. Because of this, it is vulnerable to many attacks at the AS to AS routing infrastructure. Initially, the major concern about BGP security is that malicious BGP routers can arbitrarily falsify BGP routing messages and spread incorrect routing information. Recently, some authors...

2015
Adrian Perrig Robert Szewczyk Victor Wen David Culler Asad Amir Pirzada

Recent advances in wireless networks have prompted much research attention in the area of wireless sensor network (WSN). Sensor network consists of hundreds to thousands of low power multifunctioning sensor nodes operating in hostile environment with limited computational and sensing capabilities. These sensor devices are susceptible to various attacks such as selective forwarding or sinkhole a...

Journal: :CoRR 2011
Sudhir Agrawal Sanjeev Jain Sanjeev Sharma

Mobile ad hoc networks (MANETs) are a set of mobile nodes which are self-configuring and connected by wireless links automatically as per the defined routing protocol. The absence of a central management agency or a fixed infrastructure is a key feature of MANETs. These nodes communicate with each other by interchange of packets, which for those nodes not in wireless range goes hop by hop. Due ...

2015
Adi Sosnovich Orna Grumberg Gabi Nakibly

The goal of this work is to enhance Internet security by applying formal analysis of traffic attraction attacks on the BGP routing protocol. BGP is the sole protocol used throughout the Internet for interdomain routing, hence its importance. In attraction attacks an attacker sends false routing advertisements to gain attraction of extra traffic in order to increase its revenue from customers, d...

2010
P. Samundiswary P. Dananjayan

Recent advances in wireless networks have prompted much research attention in the area of wireless sensor network (WSN). Sensor network consists of hundreds to thousands of low power multifunctioning sensor nodes operating in hostile environment with limited computational and sensing capabilities. These sensor devices are susceptible to various attacks such as selective forwarding or sinkhole a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید