Research Article
A Trust-based Approach to Mitigate Rerouting Attacks
@INPROCEEDINGS{10.4108/icst.collaboratecom.2011.247157, author={Jesus Gonzalez and Mohd Anwar and James joshi}, title={A Trust-based Approach to Mitigate Rerouting Attacks}, proceedings={7th International Conference on Collaborative Computing: Networking, Applications and Worksharing}, publisher={IEEE}, proceedings_a={COLLABORATECOM}, year={2012}, month={4}, keywords={rerouting attacks denial of service attacks markov chain trust autonomous system}, doi={10.4108/icst.collaboratecom.2011.247157} }
- Jesus Gonzalez
Mohd Anwar
James joshi
Year: 2012
A Trust-based Approach to Mitigate Rerouting Attacks
COLLABORATECOM
ICST
DOI: 10.4108/icst.collaboratecom.2011.247157
Abstract
One of the ways a malicious router can launch a Denial of Service (DoS) attack is by rerouting IP-packets of other destinations to the victim node. In this paper, based on the observed traffic anomalies, we ropose using a Markov chain model to calculate trustworthiness of routers in order to isolate the malicious ones. Furthermore, our approach reduces the false positives by including context information, such as traffic congestion and packet corruption. By means of simulation, we validate our proposed approach in both connection-oriented (i.e., TCP) and connection-less (i.e., UDP) environments.
Copyright © 2011–2024 ICST