CFP last date
20 May 2024
Reseach Article

Malicious Dropping Attack in the Internet: Impacts and Solution

by Lata L. Ragha, B. B. Bhaumik, S. K. Mukhopadhyay
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 2 - Number 3
Year of Publication: 2010
Authors: Lata L. Ragha, B. B. Bhaumik, S. K. Mukhopadhyay
10.5120/646-902

Lata L. Ragha, B. B. Bhaumik, S. K. Mukhopadhyay . Malicious Dropping Attack in the Internet: Impacts and Solution. International Journal of Computer Applications. 2, 3 ( May 2010), 31-35. DOI=10.5120/646-902

@article{ 10.5120/646-902,
author = { Lata L. Ragha, B. B. Bhaumik, S. K. Mukhopadhyay },
title = { Malicious Dropping Attack in the Internet: Impacts and Solution },
journal = { International Journal of Computer Applications },
issue_date = { May 2010 },
volume = { 2 },
number = { 3 },
month = { May },
year = { 2010 },
issn = { 0975-8887 },
pages = { 31-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume2/number3/646-902/ },
doi = { 10.5120/646-902 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:49:51.949477+05:30
%A Lata L. Ragha
%A B. B. Bhaumik
%A S. K. Mukhopadhyay
%T Malicious Dropping Attack in the Internet: Impacts and Solution
%J International Journal of Computer Applications
%@ 0975-8887
%V 2
%N 3
%P 31-35
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The unprecedented growth of the Internet over the last years, and the expectation of an even faster increase in the numbers of users and networked systems, suggest that in the near future the Internet may become the single integrated communication media. However, as the dependence on the networking infrastructure grows, its security becomes a major concern, in light of the increased attempt to compromise the infrastructure. In particular, the routing operation is a highly visible target that must be shielded against a wide range of attacks. The current interdomain routing protocol, the Border Gateway Protocol (BGP), is limited in implementations of universal security. Because of this, it is vulnerable to many attacks at the Autonomous System (AS) to AS routing infrastructure. Initially, the major concern about BGP security is that malicious BGP routers can arbitrarily falsify BGP routing messages and spread incorrect routing information. Recently, some authors have pointed out another kind of attack, called malicious dropping attack that has not studied before. The malicious draping attack can result in data traffic being blackholed or trapped in a loop. However, the authors did not elaborate on how one can detect such attacks. In this paper, we discuss and analyse a method that can be used to detect malicious dropping attacks in the Internet.

References
  1. Y. Rekhter and T. Li, “Border Gateway Protocol 4”, RFC 1771, SRI Network Information Center, July, 1995.
  2. A. Heffernan, “Protection of BGP sessions via the TCP MD5 signature option”, RFC 2385, SRI Network Information Center, August, 1998
  3. S. Kent et al, “Secure Border Gateway Protocol (S-BGP)”, IEEE Journal on Selected Areas in Communications, Volume18 Issue 4, April, 2000
  4. C. Kruegel et al, “Topology-based detection of anomalous BGP messages”, Proceedings of 6th Symposium on Recent Advanced in Intrusion Detection (RAID), 2003.
  5. S. M. Belovin and E. R. Gansner, “Using Link Cuts to attack Internet Routing”, draft, May 2003.
  6. S. M. Belovin, “Routing Security”, Talk at British Columbia Institute of Technology, June 2003.
  7. K. Zhang, X. Zhao, F. Wu, “An analysis of Selective Dropping Attack in BGP“, Proceedings of IEEE IPCCC, April, 2004.
  8. RIPE. Routing Information Service Project. http://www.ripe.net/ripencc/pub-services/np/ris-index.html.
  9. University of Oregon. The Route Views Project. http://www.routeviews.org.
  10. Mohit Lad, Akash Nanavati, Dan Massey, Lixia Zhang, “An Algorithmic Approach to Identifying Link Failures”, Proceedings of the 10th IEEE PRDC-04, pp: 25 – 34, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

AS BGP Malicious Dropping Attacks Monitoring point Instability