• DocumentCode
    2088014
  • Title

    Using conservation of flow as a security mechanism in network protocols

  • Author

    Hughes, John R. ; Aura, Tuomas ; Bishop, Matt

  • Author_Institution
    Dept. of Comput. Sci., California Univ., Davis, CA, USA
  • fYear
    2000
  • fDate
    2000
  • Firstpage
    132
  • Lastpage
    141
  • Abstract
    The law of conservation of flow, which states that an input must either be absorbed or sent on as an output (possibly with modification), is an attractive tool with which to analyze network protocols for security properties. One of its uses is to detect disruptive network elements that launch denial of service attacks by absorbing or discarding packets. Its use requires several assumptions about the protocols being analyzed. We examine the WATCHERS algorithm to detect misbehaving routers. We show that it uses conservation of flow without sufficient verification of its assumptions, and can consequently be defeated. We suggest improvements to make the use of conservation of flow valid
  • Keywords
    computer networks; protocols; security of data; telecommunication security; WATCHERS algorithm; conservation of flow; denial of service attacks; misbehaving routers; network protocol security; Broadcasting; Computer crime; Computer science; Computer security; Counting circuits; Delay; Intelligent networks; Network topology; Routing protocols;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on
  • Conference_Location
    Berkeley, CA
  • ISSN
    1081-6011
  • Print_ISBN
    0-7695-0665-8
  • Type

    conf

  • DOI
    10.1109/SECPRI.2000.848451
  • Filename
    848451