Protecting routing infrastructures from denial of service using cooperative intrusion detection

@inproceedings{Cheung1997ProtectingRI,
  title={Protecting routing infrastructures from denial of service using cooperative intrusion detection},
  author={Steven Cheung and Karl N. Levitt},
  booktitle={NSPW},
  year={1997}
}
We present a solution to the denial of service problem for routing infrastructures. When a network suffers from denial of service, packets cannot reach their destinations. Existing routing protocols are not, well-equipped to deal with denial of service; a misbehaving router-which may be caused by software/hardware faults, misconfiguration, or malicious attacks-may be able to disable entire networks. To protect network infrastructures from routers that incorrectly drop packets and misroute… CONTINUE READING
Highly Cited
This paper has 110 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 70 extracted citations

Detecting and Isolating Malicious Routers

IEEE Transactions on Dependable and Secure Computing • 2006
View 12 Excerpts
Highly Influenced

W.C. Carter Award

2005 International Conference on Dependable Systems and Networks (DSN'05) • 2005
View 12 Excerpts
Highly Influenced

Practical Intrusion-Tolerant Networks

2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS) • 2016
View 1 Excerpt

Security Mechanisms to Decrease Vulnerability of Ad-hoc Routing Protocols

G. Sunayana, Lalitha rani Sukrutharaj. M
2015
View 2 Excerpts

111 Citations

01020'97'02'08'14
Citations per Year
Semantic Scholar estimates that this publication has 111 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-7 of 7 references

OSPF Version 2

RFC • 1997
View 7 Excerpts
Highly Influenced

Reducing the Vulnerability of Dy- namic Computer Networks," ISI Research Re- port RR-88-201

G. G. Finn
University of Southern Cali- fornia, • 1988
View 4 Excerpts
Highly Influenced

On the Connection Assignment Problem of Diagnosable Systems

IEEE Trans. Electronic Computers • 1967
View 7 Excerpts
Highly Influenced

Integrating security in inter-domain routing protocols

Computer Communication Review • 1993
View 3 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…