DocumentCode :
3183025
Title :
Exploit detection techniques for STP using distributed IDS
Author :
Rai, Ankush ; Barbhuiya, Ferdous A. ; Sur, Arijit ; Biswas, Santosh ; Chakraborty, Suchetana ; Nandi, Sukumar
Author_Institution :
Dept. of Comput. Sci. & Eng., Indian Inst. of Technol. Guwahati, Guwahati, India
fYear :
2011
fDate :
11-14 Dec. 2011
Firstpage :
939
Lastpage :
944
Abstract :
Spanning tree protocol (STP) is a link layer protocol used for link management, prevention of loop formation etc. in the network. Although STP is widely used, it is still prone to many kinds of attacks that exploit the lack of security features both in basic working process and STP packet format. By exploiting STP control packet an attacker can pretend to be the new root in STP domain and perform unauthorized activities that lead to root take-over attack, STP control packet flooding, traffic redirection and so on. In this paper, a coverage based distributed intrusion detection system (DIDS) has been introduced, for the detection of attacks on STP. The proposed scheme computes a set of switches in the network that can cover the STP network completely; where every switch belongs to that set is installed with a small module of IDS. This set of IDSs logically divides the STP network into a set of local zones. All the switches in a zone is directly connected to one switch installed with IDS and thus covered by at least one IDS in STP domain. Each IDS can detect and verify any exploit inside its local zone. Additionally IDSs communicate with each other so that any exploit outside the local zone of a particular IDS can also be detected and verified. The results show that the proposed DIDS approach can detect all the STP based attacks.
Keywords :
computer network management; computer network security; protocols; DIDS; STP control packet flooding; STP packet format; computer network; coverage based distributed intrusion detection system; distributed IDS; exploit detection techniques; link layer protocol; link management; loop formation prevention; root take-over attack; security features; spanning tree protocol; traffic redirection; Bridges; Delay; Local area networks; Network topology; Probes; Protocols; Topology;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information and Communication Technologies (WICT), 2011 World Congress on
Conference_Location :
Mumbai
Print_ISBN :
978-1-4673-0127-5
Type :
conf
DOI :
10.1109/WICT.2011.6141374
Filename :
6141374
Link To Document :
بازگشت