(Created page with " == Abstract == One of the ways a malicious router can launch a Denial of Service (DoS) attack is by rerouting IP-packets of other destinations to the victim node. In this pa...")
 
m (Scipediacontent moved page Draft Content 893820217 to Anwar et al 2012a)
 
(No difference)

Latest revision as of 17:55, 28 January 2021

Abstract

One of the ways a malicious router can launch a Denial of Service (DoS) attack is by rerouting IP-packets of other destinations to the victim node. In this paper, based on the observed traffic anomalies, we propose using a Markov chain model to calculate trustworthiness of routers in order to isolate the malicious ones. Furthermore, our approach reduces the false positives by including context information, such as traffic congestion and packet corruption. By means of simulation, we validate our proposed approach in both connection-oriented (i.e., TCP) and connection-less (i.e., UDP) environments.


Original document

The different versions of the original document can be found in:

http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.ieee-000006144774,
https://eudl.eu/doi/10.4108/icst.collaboratecom.2011.247157,
http://d-scholarship.pitt.edu/13464,
https://dblp.uni-trier.de/db/conf/colcom/colcom2011.html#GonzalezAJ11,
https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6144774&isnumber=6144769,
https://academic.microsoft.com/#/detail/2074014294
Back to Top

Document information

Published on 01/01/2012

Volume 2012, 2012
DOI: 10.4108/icst.collaboratecom.2011.247157
Licence: CC BY-NC-SA license

Document Score

0

Views 0
Recommendations 0

Share this document

Keywords

claim authorship

Are you one of the authors of this document?