Statistical anomaly detection for link-state routing protocols

被引:13
|
作者
Qu, DH [1 ]
Vetter, BM [1 ]
Wang, FY [1 ]
Narayan, R [1 ]
Wu, SF [1 ]
Jou, YF [1 ]
机构
[1] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
关键词
D O I
10.1109/ICNP.1998.723726
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The JiNao project at MCNC/NCSU focuses on detecting intrusions, especially insider attacks, against OSPF (Open Shortest Path First) routing protocol. This paper presents the implementation and experiments of the Ji-Nao's statistical intrusion detection module. Our implementation is based upon the algorithm developed in SRI's NIDES (Next-generation Intrusion Detection Expert System) project. Some modifications and improvements to NIDES/STAT are made for a more effective implementation in our environment. Also, three OSPF insider attacks (e.g., maxseq, maxage, and seq++ attacks) have been developed for evaluating the efficacy of detecting capability. The experiments were conducted on two different network routing testbeds. The results indicate that the proposed statistical mechanism is ver?, effective in detecting these routing protocol attacks.
引用
收藏
页码:62 / 70
页数:9
相关论文
共 50 条
  • [1] Routing path authentication in link-state routing protocols
    Hamamreh, Rushdi
    [J]. Network Security, 2012, 2012 (05) : 14 - 20
  • [2] Design considerations for link-state routing protocols
    Sivabalan, M
    Mouftah, HT
    [J]. THIRD IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 1998, : 53 - 57
  • [3] At the core of IP networks: Link-state routing protocols
    Metz, C
    [J]. IEEE INTERNET COMPUTING, 1999, 3 (05) : 72 - 77
  • [4] Spatiotemporal neural networks for link-state routing protocols
    ShaikhHusin, N
    Meador, JL
    [J]. ISCAS 96: 1996 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS - CIRCUITS AND SYSTEMS CONNECTING THE WORLD, VOL 3, 1996, : 547 - 550
  • [5] At the core of IP networks: Link-state routing protocols
    Metz, Christopher
    [J]. IEEE Internet Computing, 3 (05): : 72 - 77
  • [6] Avoiding transient loops during the convergence of link-state routing protocols
    Francois, Pierre
    Bonaventure, Olivier
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2007, 15 (06) : 1280 - 1292
  • [7] The Birth of Link-State Routing
    McQuillen, John
    Walden, David
    [J]. IEEE ANNALS OF THE HISTORY OF COMPUTING, 2009, 31 (01) : 68 - 71
  • [8] Small Lies, Lots of Damage: a Partition Attack on Link-State Routing Protocols
    Cohen, Reuven
    Hess-Green, Raziel
    Nakibly, Gabi
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 397 - 405
  • [9] Enhancing the network scalability of link-state routing protocols by reducing their flooding overhead
    Miyamura, T
    Kurimoto, T
    Aoki, M
    [J]. HPSR 2003: WORKSHOP ON HIGH PERFORMANCE SWITCHING AND ROUTING, 2003, : 263 - 268
  • [10] Scalable link-state Internet routing
    Garcia-Luna-Aceves, JJ
    Spohn, M
    [J]. SIXTH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS, 1998, : 52 - 61