Design and evaluation of a policy-based security routing and switching system for data interception attacks

Yudong Zhao*, Ke Xu, Rashid Mijumbi, Meng Shen

*此作品的通讯作者

科研成果: 书/报告/会议事项章节会议稿件同行评审

摘要

In recent years, the world has been shocked by the increasing number of network attacks that take advantage of router vulnerabilities to perform data interceptions. Such attacks are generally based on low cost, unidirectional, concealed mechanisms, and are very difficult to recognize let alone restrain. This is especially so, because the most affected parties - the users and Internet Service Providers (ISPs) - have very little control, if any, on router vulnerabilities. In this paper, we design, implement and evaluate a policy-based security system aimed at stopping such attacks from both the routing and switching network functions, by detecting any violations in the set policies. We prove the system’s security completeness to data interception attacks. Based on simulations, we show that 100% of normal packets can pass through the policy-based system, and about 99.92% of intercepting ones would be caught. In addition, the performance of the proposed system is acceptable with regard to current TCP/IP networks.

源语言英语
主期刊名Big Data Computing and Communications - 1st International Conference, BigCom 2015, Proceedings
编辑Shlomo Argamon, Xiang Yang Li, Hui Xiong, JianZhong Li, Yu Wang
出版商Springer Verlag
179-192
页数14
ISBN(印刷版)9783319220468
DOI
出版状态已出版 - 2015
活动1st International Conference on Big Data Computing and Communications, BigCom 2015 - Taiyuan, 中国
期限: 1 8月 20153 8月 2015

出版系列

姓名Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
9196
ISSN(印刷版)0302-9743
ISSN(电子版)1611-3349

会议

会议1st International Conference on Big Data Computing and Communications, BigCom 2015
国家/地区中国
Taiyuan
时期1/08/153/08/15

指纹

探究 'Design and evaluation of a policy-based security routing and switching system for data interception attacks' 的科研主题。它们共同构成独一无二的指纹。

引用此