Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Detecting Malicious Packet Losses
Post: #1

Detecting Malicious Packet Losses
Consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, we are concerned with a simple yet effective attack in which a router selectively drops packets destined for some Victim. Unfortunately, it is quite challenging to attribute a missing packet to a malicious action because normal network congestion can produce the same effect. Modern networks routinely drop packets when the load temporarily exceeds their buffering capacities. Previous detection protocols have tried to address this problem with a user-defined threshold: too many dropped packets imply malicious intent. However, this heuristic is fundamentally unsound; setting this threshold is, at best, an art and will certainly create unnecessary false positives or mask highly focused attacks. We have designed, developed, and implemented a compromised router detection protocol that dynamically infers, based on measured traffic rates and buffer sizes, the number of congestive packet losses that will occur. Once the ambiguity from congestion is removed, subsequent packet losses can be attributed to malicious actions. We have tested our protocol in Emulab and have studied its effectiveness in differentiating attacks from legitimate network behavior.
Post: #2
to get information about the topic detecting malicious packet losses full report ppt, and related topics refer the link bellow

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: viva questions for seperation of losses, fuctions in detecting malicious packet losses project documentation, net code for detecting malicious packet losses, what is a malicious node wikipedia, theory for seperation of losses in dc machine, a model based approach to evaluation of the efficacy of fec coding in combating network packet losses a model based approach, detecting malicious packet loss uml diagrams,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Cellular Digital Packet Data computer science crazy 3 4,291 28-11-2012 11:24 AM
Last Post: seminar details
  detecting internal FAUlTS IN A TRANSFORMER WINDING Wifi 0 1,788 28-10-2010 10:05 AM
Last Post: Wifi
  Optical packet switch architectures computer science crazy 0 1,164 21-09-2008 11:46 AM
Last Post: computer science crazy
  General Packet Radio Service computer science crazy 0 919 21-09-2008 11:15 AM
Last Post: computer science crazy
  Optical Packet Switching Network computer science crazy 0 1,238 21-09-2008 10:25 AM
Last Post: computer science crazy