Modelling Multiple Packet Filters with FSA for Filtering Malicious Packet
نویسندگان
چکیده
منابع مشابه
FSA-based Packet Filters
We propose a packet filtering technique based on the generation and composition of Finite-State Automata (FSA), in contrast to most traditional imperative approaches. FSAs provide a formal framework with well-defined composition operations and enable the generation of optimized executable code without resorting to multiple and opportunistic optimization algorithms. Memory safety in filters is e...
متن کاملRobust Model for Networked Control System with Packet Loss
The Networked Control System in modern control widely uses to decrease the implementation cost and increasing the performance. NCS in addition to its advantages is inevitable. Nevertheless they suffer of some limitations and deficiencies. Packet loss is one of the main limitations which affect the control system in different conditions and finally may lead to system instability. For this reason...
متن کاملAdaptive packet filters
Adaptive Packet Filters (APFs) are motivated by the proliferation of distributed servers and the lack of Quality-of-Service (QoS) management solutions for them. APFs merge packet-filtering and server load monitoring into a novel load-sensitive packet-filtering abstraction for overload protection and QoS differentiation. They integrate well into network protocol stacks and firewalls, scale to la...
متن کاملEfficient way of Detecting Malicious Packet Losses
We consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, we are concerned with a simple yet effective attack in which a router selectively drops packets destined for some Victim. Unfortunately, it is quite challenging to attribute a missing packet to a malicious action because normal network congestion can produce the sa...
متن کاملUsing Packet Symmetry to Curtail Malicious Traffic
This paper argues that a key omission from the original Internet architecture was that of packet dynamics. The historical obsession with end-to-end design has resulted in connection signalling, flowand congestion-control loops being pushed to the transport layer (if not simply ignored); these decisions have effectively legislated for the sort of resource exploitation attacks that are a problem ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2015
ISSN: 0975-8887
DOI: 10.5120/ijca2015906143