An Efficient Authentication Scheme for Mitigating Maliciously Dropped Packets

Karthik. S, Dharmaraj. M, Mustak Ahamed. A, S. Manikandan

Abstract


Consider the matter of detection whether or not a compromised router is maliciously manipulating its stream of packets. The involved with a straight forward nonetheless effective attack during which a router by selection drops packets destined for a few victim. Sadly, it is quite difficult to attribute a missing packet to a malicious action as a result of traditional network congestion will turn out a similar impact. Trendy networks habitually drop packets once the load briefly exceeds their buffering capacities. Previous detection protocols have tried to deal with this drawback with a user-defined threshold: too several born packets imply malicious intent. This heuristic is essentially unsound; setting this threshold is, at best, an art and can actually produce reserve false positives or mask extremely centered attacks. they need designed, developed, and enforced a compromised router detection protocol that dynamically infers, supported measured traffic rates and buffer sizes, the quantity of symptom packet losses that may occur. Once the anomaly from congestion is removed, later packet losses are often attributed to malicious actions.

 


Full Text:

PDF

Refbacks