• DocumentCode
    249098
  • Title

    Detecting packet modification attack by misbehaving router

  • Author

    Patil, Rahul ; Tahiliani, Mohit P.

  • Author_Institution
    Nat. Inst. of Technol. Karnataka, Surathkal, India
  • fYear
    2014
  • fDate
    19-20 Aug. 2014
  • Firstpage
    113
  • Lastpage
    118
  • Abstract
    The next generation Internet supports dynamic deployment of different protocols and heterogeneous applications. To support this, routers in next generation computer networks use general purpose programmable packet processors. The customization of routers introduces increased vulnerabilities and attacks that allow potential attackers to compromise the router. Since network routers play a key role in todays network data transport, they became an interesting targets for attackers. An attacker can mount different attacks like denial-of-service or man-in-the-middle by intelligently dropping, modifying or diverting packets arriving at a compromised router. In this paper, we considered the problem of detecting packet modification attack which is performed by an attacker through misbehaving router. Since it is necessary to differentiate malicious packet modification from regular packet modification, detecting such an attack is challenging task. We proposed a controller-based packet modification misbehavior detection technique that excellently detects malicious packet modification by using a hash-based comparison of incoming and outgoing packets of the router. Experiments were carried out using Mininet Simulator and based on the results obtained, we observe that our proposed technique unambiguously detects the malicious packet modification.
  • Keywords
    Internet; computer network security; cryptographic protocols; routing protocols; Internet supports; Mininet simulator; computer networks; controller-based packet modification misbehavior detection technique; denial of service attacks; diverting packets; dropping packets; hash-based comparison; heterogeneous applications; malicious packet modification; man-in-the-middle; misbehaving router; modifying packets; network data transport; network routers; packet modification attack detection; programmable packet processors; protocols applications; regular packet modification; IP networks; Monitoring; Network topology; Routing protocols; Software; Switches;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Networks & Soft Computing (ICNSC), 2014 First International Conference on
  • Conference_Location
    Guntur
  • Print_ISBN
    978-1-4799-3485-0
  • Type

    conf

  • DOI
    10.1109/CNSC.2014.6906649
  • Filename
    6906649