DocumentCode
147177
Title
Investigating attacks and challenges in internet path fingerprinting based on packet-pair technique
Author
Surya, Sumukh ; Porselvi, R.C.
Author_Institution
Dept. of Electron. & Commun. Eng., Easwari Eng. Coll., Chennai, India
fYear
2014
fDate
3-5 April 2014
Firstpage
1400
Lastpage
1404
Abstract
The packet-pair technique is a well-known approved method to estimate the capacity of a path. Recent observations and findings specify that this technique can be utilized to generate Internet path fingerprints. The packet-pair technique proposes a novel scheme for remote path identification using the distribution of packet-pair dispersions. Previous findings indicate that the packet-pair dispersion technique can leak valuable information about the identity and or locations of the remote hosts. Internet Path fingerprinting is the vital element of applications that distinguish among different network paths, path selection in overlay networks, multi-path routing, monitoring and diagnosis of network problems, and understanding of network behavior far more deeper. In this paper we investigate whether dispersion-based path fingerprints can be forged by an adversary who intent to impersonate a given path (e.g., where a malicious host creates multiple identities to alter reputation systems). We analyze the capability of an attacker to convince the verifier by accepting the path fingerprint that matches to the claimed identity of the prover. We further propose a secured method for mitigating the impersonation attacks in path identification system, even though there are a number of challenges that have to be defeated by an adversary or rogue in order to successfully impersonate the target path.
Keywords
Internet; computer crime; computer network reliability; computer network security; overlay networks; telecommunication network routing; Internet path fingerprinting; dispersion-based path fingerprints; impersonation attacks; malicious host; multipath routing; network behavior; network paths; network problems diagnosis; network problems monitoring; overlay networks; packet-pair dispersions distribution; packet-pair technique; path capacity estimation; path selection; remote path identification; reputation systems; verifier; Atmospheric measurements; Fingerprint recognition; Internet; Monitoring; Overlay networks; Particle measurements; Routing; Packet-pair dispersion; Path fingerprinting; Security;
fLanguage
English
Publisher
ieee
Conference_Titel
Communications and Signal Processing (ICCSP), 2014 International Conference on
Conference_Location
Melmaruvathur
Print_ISBN
978-1-4799-3357-0
Type
conf
DOI
10.1109/ICCSP.2014.6950079
Filename
6950079
Link To Document