Detecting service violation in Internet and Mobile ad hoc networks

Detecting service violation in Internet and Mobile ad hoc networks provides about Example of service violation, Monitoring network activities to deal with, Fundamental Notions, Ideas from Distributed Systems, Defeating DoS attacks in Internet, Edge-to-Edge (E2E) Approaches. | Detecting service violation in Internet and Mobile ad hoc networks Bharat Bhargava CERIAS security center and Department of computer sciences Purdue University bb@ Problem Statement Detecting service violation in networks is the procedure of identifying the misbehaviors of users or operations that do not adhere to network protocols. Contributions Infer internal behaviors based on SLA parameters Advance probing technology Advance Intrusion Detection, QoS and DiffServ, intruder identification, and Fault-tolerant authentication Integrate cellular networks with ad hoc networks to Enable cellular providers to add services Ad hoc networks get central trusted authority Enable the deployment of security sensitive applications Example of service violation In Internet: DoS attacks, exploit known vulnerabilities that make victim un-operable, flood network Attacks/ Service Violations in QoS domains Impersonate a legitimate customer by spoofing flow identity Mark Packets to a higher class of services Bypassing the ingress routers and using best effort traffic. Example of service violation In cellular networks: Cellular user impersonation Control channel spoofing and jamming In mobile ad hoc networks Node misbehaviors (selfish, malicious, mal-functioning, compromised node, Byzantine behavior) Passive attacks (eavesdropping) Node impersonation and gang attack DoS and link layer flood Energy depletion attacks Content Research motivation Classification of attacks and detection mechanisms Network topology Examples Detecting service violation by distributed monitoring [NSF ITR-ANIR, IBM] Intruder identification in mobile ad hoc networks [CISCO] Fault tolerant Authentication in movable base station [NSF CCR] Cellular assisted mobile ad hoc networks (in progress) [Motorola] Conclusion Research Motivation The hybrid of Internet, cellular system and mobile ad hoc networks introduce more vulnerabilities. [S. Bush, GE Research ’99] The popularity of | Detecting service violation in Internet and Mobile ad hoc networks Bharat Bhargava CERIAS security center and Department of computer sciences Purdue University bb@ Problem Statement Detecting service violation in networks is the procedure of identifying the misbehaviors of users or operations that do not adhere to network protocols. Contributions Infer internal behaviors based on SLA parameters Advance probing technology Advance Intrusion Detection, QoS and DiffServ, intruder identification, and Fault-tolerant authentication Integrate cellular networks with ad hoc networks to Enable cellular providers to add services Ad hoc networks get central trusted authority Enable the deployment of security sensitive applications Example of service violation In Internet: DoS attacks, exploit known vulnerabilities that make victim un-operable, flood network Attacks/ Service Violations in QoS domains Impersonate a legitimate customer by spoofing flow identity Mark .

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.