首页> 外文OA文献 >Detecting compromised routers via packet forwarding behavior
【2h】

Detecting compromised routers via packet forwarding behavior

机译:通过数据包转发行为检测受感染的路由器

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well appreciated that Internet routers are also being actively targeted and compromised. Indeed, due to its central role in end-to-end communication, a compromised router can be leveraged to empower a wide range of direct attacks including eavesdropping, man-in-the-middle subterfuge, and denial of service. In response, a range of specialized anomaly detection protocols has been proposed to detect misbehaving packet forwarding between routers. This article provides a general framework for understanding the design space of this work and reviews the capabilities of various detection protocols. © 2008 IEEE.
机译:众所周知,犯罪分子正在颠覆大量与互联网连接的计算机(例如,用于僵尸程序,间谍软件,垃圾邮件转发),但人们还不太了解互联网路由器也受到了积极的攻击和破坏。确实,由于其在端到端通信中的核心作用,可以利用受损的路由器来实施各种直接攻击,包括窃听,中间人欺骗和拒绝服务。作为响应,已经提出了一系列专门的异常检测协议来检测路由器之间的异常分组转发。本文提供了一个用于了解这项工作的设计空间的通用框架,并回顾了各种检测协议的功能。 ©2008 IEEE。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号