Design and evaluation of a policy-based security routing and switching system for data interception attacks

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In recent years, the world has been shocked by the increasing number of network attacks that take advantage of router vulnerabilities to perform data interceptions. Such attacks are generally based on low cost, unidirectional, concealed mechanisms, and are very difficult to recognize let alone restrain. This is especially so, because the most affected parties - the users and Internet Service Providers (ISPs) - have very little control, if any, on router vulnerabilities. In this paper, we design, implement and evaluate a policy-based security system aimed at stopping such attacks from both the routing and switching network functions, by detecting any violations in the set policies. We prove the system’s security completeness to data interception attacks. Based on simulations, we show that 100% of normal packets can pass through the policy-based system, and about 99.92% of intercepting ones would be caught. In addition, the performance of the proposed system is acceptable with regard to current TCP/IP networks.

Cite

CITATION STYLE

APA

Zhao, Y., Xu, K., Mijumbi, R., & Shen, M. (2015). Design and evaluation of a policy-based security routing and switching system for data interception attacks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9196, pp. 179–192). Springer Verlag. https://doi.org/10.1007/978-3-319-22047-5_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free