Using Link Cuts to Attack Internet Routing
نویسندگان
چکیده
Attacks on the routing system, with the goal of diverting traffic past an enemy-controlled point for purposes of eavesdropping or connection-hijacking, have long been known. In principle, at least, these attacks can be countered by use of appropriate authentication techniques. We demonstrate a new attack, based on link-cutting, that cannot be countered in this fashion. Armed with a topology map and a list of already-compromised links and routers, an attacker can calculate which links to disable, in order to force selected traffic to pass the compromised elements. The calculations necessary to launch this attack are quite efficient; in our implementation, most runs took less than half a second, on databases of several hundred nodes. We also suggest a number of work-arounds, including one based on using intrusion detection systems to modify routing metrics.
منابع مشابه
Multipath Routing Scheme for Link Failures in Broadband Communications
Broadband communications are concerned with various types of failures, varying from single link failures such as fibre cuts, inline equipment breakdown to multiple network failures which significantly affects the backbone of the Internet. Alternative routing schemes and backup metholodgy is needed to recovery from link failures. In this paper we propose a multipath routing schemes for various l...
متن کاملImproving the Performance of RPL Routing Protocol for Internet of Things
The emerging Internet of Things (IoT) connects the physical world to the digital one and composes large networks of smart devices to support various applications. In order to provide a suitable communication in such networks, a reliable routing protocol is needed. In this paper, a modified version of an IPv6 Routing Protocol for Low-Power and Lossy networks (RPL), which has been standardized by...
متن کاملA Scalable Method for Router Attack Detection and Location in Link State Routing
The routing table poisoning attack is one of the most devastating and least researched topic among Internet attacks, which needs immediate research attention. In this paper, we develop a scalable method for detecting router attacks and locating the malicious routers (within a small bounded set of nodes) in link state routing protocols. We carry out analytical and simulation studies to evaluate ...
متن کاملDesign & Implementation of Hybrid Ip Traceback Involving Path Reconstruction Using Qos
Ease of access to internet in this present situation has increased the threats to the security of the network. Illegitimate user’s causes damage to the resources, thereby hindering the service rendered to the users. Defending against Denial of Service (DoS) attacks requires not only mitigating its effect but also to identify the corresponding source of attack. This process is called IP tracebac...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003