IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 2- Issue 6, June 2013 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Router Attacks-Detection And Defense Mechanisms

[Full Text]

 

AUTHOR(S)

Saili Waichal, B.B.Meshram

 

KEYWORDS

Index Terms: Access Control lists, Regular Expression Matching, Router Attacks, Router Debugging, Router Logs, Router Security, Syslog.

 

ABSTRACT

Abstract: Router is one of the most important components of any network. Their main aim is taking routing decision to forward a packet to its destination. It can be a home or small office router which takes your traffic on the internet; or it can also be one of the core routers which form the backbone of the internet. Being such an important component, routers are often targeted for attacks. It thus becomes necessary to apply some kind of security mechanism to protect them. This paper gives a survey of different methods for router management and security. The aim is to detect any anomalous behavior of router which can lead to collapse of entire network. It then focuses on using an excellent in built feature available in almost any machine like router or web server or mail server or switch or database server which is LOGS!!! Proper analysis of logs that are generated can be extremely useful for detecting any anomalous behavior of the router. Thus logs can provide us huge information for solving a misconfiguration on router or detect an intrusion on the system. In this paper we give details about how to use router logs for attacks detection and defense.

 

REFERENCES

[1]. Charalampos Patrikakis, Michalis Masikos, and Olga Zourarak, DISTRIBUTED DENIAL OF SERVICE ATTACKS, The Internet Protocol Journal - Volume 7, Number 4, 2004.

[2]. ICMP Attacks Illustrated, SANS Institute InfoSec Reading Room

[3]. Michael Sudkovitch and David I. Roitman, OSPF Security project book, 2010.

[4]. Danai Chasaki and Tilman Wolf, ATTACKS AND DEFENSES IN THE DATA PLANE OF NETWORKS, IEEE transactions on dependable and secure computing (tdsc), 2012.

[5]. Kirk A.Radley, Steven Cheung, Nicholas Puketza, Biswanath Mukherjee, and Ronald A. Olsson, DETECTING DISRUPTIVE ROUTERS: A DISTRIBUTED NETWORK MONITORING APPROACH.

[6]. Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay, LOCATING NETWORK DOMAIN ENTRY AND EXIT POINT/PATH FOR DDOS ATTACK TRAFFIC.

[7]. Muhammad Naveed, Shams un Nihar, Mohammad Inayatullah Babar, NETWORK INTRUSION PREVENTION BY CONFIGURING ACLS ON THE ROUTERS, BASED ON SNORT IDS ALERTS, Emerging Technologies (ICET), 2010.

[8]. Anand Deveriya, An overview of the Syslog protocol, Cisco Press, 2005.

[9]. Karsten Iwen, Logging in Cisco IOS.

[10]. Sean Wilkins, Basic access lists configuration for cisco devices, Cisco Press, 2011.

[11]. Cisco IOS Debug Command Reference, Release 12.3.