• DocumentCode
    147177
  • Title

    Investigating attacks and challenges in internet path fingerprinting based on packet-pair technique

  • Author

    Surya, Sumukh ; Porselvi, R.C.

  • Author_Institution
    Dept. of Electron. & Commun. Eng., Easwari Eng. Coll., Chennai, India
  • fYear
    2014
  • fDate
    3-5 April 2014
  • Firstpage
    1400
  • Lastpage
    1404
  • Abstract
    The packet-pair technique is a well-known approved method to estimate the capacity of a path. Recent observations and findings specify that this technique can be utilized to generate Internet path fingerprints. The packet-pair technique proposes a novel scheme for remote path identification using the distribution of packet-pair dispersions. Previous findings indicate that the packet-pair dispersion technique can leak valuable information about the identity and or locations of the remote hosts. Internet Path fingerprinting is the vital element of applications that distinguish among different network paths, path selection in overlay networks, multi-path routing, monitoring and diagnosis of network problems, and understanding of network behavior far more deeper. In this paper we investigate whether dispersion-based path fingerprints can be forged by an adversary who intent to impersonate a given path (e.g., where a malicious host creates multiple identities to alter reputation systems). We analyze the capability of an attacker to convince the verifier by accepting the path fingerprint that matches to the claimed identity of the prover. We further propose a secured method for mitigating the impersonation attacks in path identification system, even though there are a number of challenges that have to be defeated by an adversary or rogue in order to successfully impersonate the target path.
  • Keywords
    Internet; computer crime; computer network reliability; computer network security; overlay networks; telecommunication network routing; Internet path fingerprinting; dispersion-based path fingerprints; impersonation attacks; malicious host; multipath routing; network behavior; network paths; network problems diagnosis; network problems monitoring; overlay networks; packet-pair dispersions distribution; packet-pair technique; path capacity estimation; path selection; remote path identification; reputation systems; verifier; Atmospheric measurements; Fingerprint recognition; Internet; Monitoring; Overlay networks; Particle measurements; Routing; Packet-pair dispersion; Path fingerprinting; Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications and Signal Processing (ICCSP), 2014 International Conference on
  • Conference_Location
    Melmaruvathur
  • Print_ISBN
    978-1-4799-3357-0
  • Type

    conf

  • DOI
    10.1109/ICCSP.2014.6950079
  • Filename
    6950079