Design and evaluation of a policy-based security routing and switching system for data interception attacks

Yudong Zhao*, Ke Xu, Rashid Mijumbi, Meng Shen

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In recent years, the world has been shocked by the increasing number of network attacks that take advantage of router vulnerabilities to perform data interceptions. Such attacks are generally based on low cost, unidirectional, concealed mechanisms, and are very difficult to recognize let alone restrain. This is especially so, because the most affected parties - the users and Internet Service Providers (ISPs) - have very little control, if any, on router vulnerabilities. In this paper, we design, implement and evaluate a policy-based security system aimed at stopping such attacks from both the routing and switching network functions, by detecting any violations in the set policies. We prove the system’s security completeness to data interception attacks. Based on simulations, we show that 100% of normal packets can pass through the policy-based system, and about 99.92% of intercepting ones would be caught. In addition, the performance of the proposed system is acceptable with regard to current TCP/IP networks.

Original languageEnglish
Title of host publicationBig Data Computing and Communications - 1st International Conference, BigCom 2015, Proceedings
EditorsShlomo Argamon, Xiang Yang Li, Hui Xiong, JianZhong Li, Yu Wang
PublisherSpringer Verlag
Pages179-192
Number of pages14
ISBN (Print)9783319220468
DOIs
Publication statusPublished - 2015
Event1st International Conference on Big Data Computing and Communications, BigCom 2015 - Taiyuan, China
Duration: 1 Aug 20153 Aug 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9196
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference1st International Conference on Big Data Computing and Communications, BigCom 2015
Country/TerritoryChina
CityTaiyuan
Period1/08/153/08/15

Keywords

  • Data interception attacks
  • Policy-based routing and switching system
  • Router vulnerabilities
  • Security completeness

Fingerprint

Dive into the research topics of 'Design and evaluation of a policy-based security routing and switching system for data interception attacks'. Together they form a unique fingerprint.

Cite this