Security and intrusion detection for routing protocols are two closely related topics in the protection of network infrastructure. The former focuses on secure network control protocols, while the latter is in the area of network security management. In this paper, we study the integration of these two areas: control and management. We take OSPF, a link-state routing protocol, as a target example to demonstrate the advantages for this integrated architecture. We will also show some preliminary implementation results. 1 Introduction Security and intrusion detection for routing protocols are two closely related topics in the protection of network infrastructure. The former focuses on secure network control protocols (control plane), while th...
Abstract — We consider the threat imposed on network routing in “open ” networks such as community w...
Abstract. We consider the security of routing protocols for Mobile Ad-hoc Networks (MANETs). We pres...
Network routing is vulnerable to disruptions caused by malfunctioning or malicious routers that draw...
The routing protocols used to disseminate routing information throughout the Internet are not protec...
The TCP/IP suite is the basis for today’s Internet, yet it lacks even the most basic mechanisms of a...
A real-time knowledge-based network intrusion detection model for link-state routing protocol is pre...
This paper presents a new intrusion detection approach, property-oriented analysis and detection (PO...
The pervasive nature of information infrastructure coupled with threats for cyber terrorism makes ne...
Abstract:- This paper focuses on the network infrastructure security measures currently proposed and...
M.Sc.Using the Internet for communication purposes constitutes a high risk, considering the security...
This paper presents the results from a detailed, exper-imental study of OSPF, an intra-domain routin...
Abstract-This paper presents security mechanisms for router and link admittance control in OLSRv2. D...
Improving IP control plane (routing) robustness is critical to the creation of reliable and stable I...
The Internet routing system plays an essential role of glueing together tens of thousands of individ...
International audienceThis paper presents security mechanisms for router and link admittance control...
Abstract — We consider the threat imposed on network routing in “open ” networks such as community w...
Abstract. We consider the security of routing protocols for Mobile Ad-hoc Networks (MANETs). We pres...
Network routing is vulnerable to disruptions caused by malfunctioning or malicious routers that draw...
The routing protocols used to disseminate routing information throughout the Internet are not protec...
The TCP/IP suite is the basis for today’s Internet, yet it lacks even the most basic mechanisms of a...
A real-time knowledge-based network intrusion detection model for link-state routing protocol is pre...
This paper presents a new intrusion detection approach, property-oriented analysis and detection (PO...
The pervasive nature of information infrastructure coupled with threats for cyber terrorism makes ne...
Abstract:- This paper focuses on the network infrastructure security measures currently proposed and...
M.Sc.Using the Internet for communication purposes constitutes a high risk, considering the security...
This paper presents the results from a detailed, exper-imental study of OSPF, an intra-domain routin...
Abstract-This paper presents security mechanisms for router and link admittance control in OLSRv2. D...
Improving IP control plane (routing) robustness is critical to the creation of reliable and stable I...
The Internet routing system plays an essential role of glueing together tens of thousands of individ...
International audienceThis paper presents security mechanisms for router and link admittance control...
Abstract — We consider the threat imposed on network routing in “open ” networks such as community w...
Abstract. We consider the security of routing protocols for Mobile Ad-hoc Networks (MANETs). We pres...
Network routing is vulnerable to disruptions caused by malfunctioning or malicious routers that draw...