Loading...
Please wait, while we are loading the content...
Similar Documents
Abstract sensor-based intrusion detection.
| Content Provider | CiteSeerX |
|---|---|
| Abstract | Detection of routing-based attacks is difficult because malicious routing behavior can be identified only in specific network locations. In addition, the configuration of the signatures used by intrusion detection sensors is a timeconsuming and error-prone task because it has to take into account both the network topology and the characteristics of the particular routing protocol in use. We describe an intrusion detection technique that uses information about both the network topology and the positioning of sensors to determine what can be considered malicious in a particular place of the network. The technique relies on an algorithm that automatically generates the appropriate sensor signatures. This paper presents a description of the approach, applies it to an intra-domain distance-vector protocol and reports the results of its evaluation. |
| File Format | |
| Access Restriction | Open |
| Subject Keyword | Intrusion Detection Technique Particular Routing Protocol Intra-domain Distance-vector Protocol Specific Network Location Network Topology Abstract Sensor-based Intrusion Detection Error-prone Task Appropriate Sensor Signature Particular Place Intrusion Detection Sensor Routing-based Attack |
| Content Type | Text |
| Resource Type | Article |