7th International Conference on Collaborative Computing: Networking, Applications and Worksharing

Research Article

A Trust-based Approach to Mitigate Rerouting Attacks

Download637 downloads
  • @INPROCEEDINGS{10.4108/icst.collaboratecom.2011.247157,
        author={Jesus Gonzalez and Mohd Anwar and James joshi},
        title={A Trust-based Approach to Mitigate Rerouting Attacks},
        proceedings={7th International Conference on Collaborative Computing: Networking, Applications and Worksharing},
        publisher={IEEE},
        proceedings_a={COLLABORATECOM},
        year={2012},
        month={4},
        keywords={rerouting attacks denial of service attacks markov chain trust autonomous system},
        doi={10.4108/icst.collaboratecom.2011.247157}
    }
    
  • Jesus Gonzalez
    Mohd Anwar
    James joshi
    Year: 2012
    A Trust-based Approach to Mitigate Rerouting Attacks
    COLLABORATECOM
    ICST
    DOI: 10.4108/icst.collaboratecom.2011.247157
Jesus Gonzalez1, Mohd Anwar1, James joshi1,*
  • 1: University of Pittsburgh
*Contact email: jjoshi@sis.pitt.edu

Abstract

One of the ways a malicious router can launch a Denial of Service (DoS) attack is by rerouting IP-packets of other destinations to the victim node. In this paper, based on the observed traffic anomalies, we ropose using a Markov chain model to calculate trustworthiness of routers in order to isolate the malicious ones. Furthermore, our approach reduces the false positives by including context information, such as traffic congestion and packet corruption. By means of simulation, we validate our proposed approach in both connection-oriented (i.e., TCP) and connection-less (i.e., UDP) environments.