Attacker standard for secure routing protocols

  • Authors

    • Ms Divya
    • Dr R. Gobinath
    2018-06-08
    https://doi.org/10.14419/ijet.v7i2.33.14168
  • Network, network security, routing and routing protocol.
  • The secured routing protocol expresses an underlying elementary unit confide in information interchanging system. Miserably, presently no anatomy remains to supports in the layout and inquiry of secured routing protocols. This work investigates the structured approaches of secured routing and the interrelating attacker standards to contribute a structure for modeling prime protocols. Based on this anatomy, it is detected that the powerful attacks are targeting the data in the control plane. In this paper the strength of attackers are classified with respect to the locations under its direct control.

     

     

  • References

    1. [1] Netis routers leave wide open backdoor. Http: //blog.trendmicro.com/trendlabs-security-intelligence/ netis-routers-leave-wide-open-backdoor/, 2014.

      [2] H. Ballani, P. Francis, and X. Zhang.A study of preï¬x hijacking and interception in the internet. In Proc. ACM SIGCOMM, pages 265–276, 2007.

      [3] A. Barbir, S. Murphy, and Y. Yang.Generic threats to routing protocols. Request for Comments 4593, 2006.

      [4] K. Butler, T. Farley, P. McDaniel, and J. Rexford.A survey of bgp security issues and solutions. Proceedings of the IEEE, 98(1):100–122, 2010.

      [5] H. Chan, D. Dash, A. Perrig, and H. Zhang.Modeling adoptability of secure BGP protocols.In Proc. ACM SIGCOMM, Sept. 2006.

      [6] W. Galuba, P. Papadimitratos, M. Poturalski, K. Aberer, Z. Despotovic, and W. Kellerer. Castor: Scalable Secure Routing for Ad Hoc Networks. In IEEE INFOCOM, pages 1–9, San Diego, CA, USA, March 2010.

      [7] S. Goldberg, M. Schapira, P. Hummon, and J. Rexford. How secure are secure interdomain routing protocols. In Proc. ACM SIGCOMM, 2010.

      [8] Y.-C. Hu and A. Perrig.A survey of secure wireless ad hoc routing. IEEE Security and Privacy, 2(3):28–39, May 2004.

      [9] Y.-C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11(1):21–38, 2005.

      [10] C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, 1(2–3):293–315, Sept. 2003.

      [11] F. Lindner. Cisco ios router exploitation.Black Hat USA, 2009.

      [12] R. Lychev, S. Goldberg, and M. Schapira.BGP security in partial deployment.is the juice worth the squeeze? In Proc. ACM SIGCOMM, 2013.

      [13] D. Montgomery and S. Murphy. Toward secure routing infrastructures. Security Privacy, IEEE, 4(5):84–87, 2006.

      [14] P. Papadimitratos and Z. Haas. Secure Routing for Mobile Ad Hoc Networks. In SCS CNDS, pages 193–204, San Antonio, TX, USA, January 2002.

      [15] P. Papadimitratos, Z. Haas, and J. Hubaux.How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET.In IEEE-CS Third International Conference on BroadBandCommuncations, Networks, and Systems, 2006.

      [16] P. Papadimitratos and Z. J. Haas. Secure Data Communication in Mobile Ad Hoc Networks. IEEE Journal on Selected Areas in Communications, 24(2):343–356, February 2006.

      [17] D. Pei, L. Zhang, and D. Massey. A framework for resilient internet routing protocols. IEEE Network, 18(2):5–12, Apr. 2004.

      [18] M. Poturalski, P. Papadimitratos, and J. P. Hubaux.Formal Analysis of Secure Neighbor Discovery in Wireless Networks. IEEE Trans. on Dependable and Secure Computing, 10(6):355–367, Nov 2013.

      [19] B. Snyder. Snowden: The nsa planted backdoors in cisco products. InfoWorld, 2014.

  • Downloads

  • How to Cite

    Divya, M., & R. Gobinath, D. (2018). Attacker standard for secure routing protocols. International Journal of Engineering & Technology, 7(2.33), 279-282. https://doi.org/10.14419/ijet.v7i2.33.14168