DocumentCode :
3451346
Title :
Honeypot router for routing protocols protection
Author :
Ghourabi, Abdallah ; Abbes, Tarek ; Bouhoula, Adel
Author_Institution :
Dept. of Comput. Sci. & Networks, Higher Sch. of Telecommun. (SupCom), Cite El Ghazala, Tunisia
fYear :
2009
fDate :
19-22 Oct. 2009
Firstpage :
127
Lastpage :
130
Abstract :
Routing protocols are essential for interconnecting networks; however they may enclose several vulnerabilities that can be exploited by malicious attackers. For example, an attacker may send forged packets to a router with the intention of changing or corrupting the routing table, which in turn can reduce the network connectivity and degrade the router functionalities. To prevent and detect such attacks, several security techniques are available like firewall, authentication mechanisms and intrusion detection system (IDS). Nevertheless these security methods encounter some problems, especially when dealing with new attacks. Relying on additional security principles seems to be important to well protect network connectivity offered by routers. In this paper, we propose using honeypot to protect routing protocols. Honeypot is particularly useful to attract attackers, driving them away real routers and allowing the administrators to be aware about intrusion attempts on their networks and the employed techniques that can be recent. Our solution (honeypot router) is to deploy a honeypot playing the role of a router. The honeypot is based on routing software called Quagga and other tools for traffic capture and analysis. The entire solution supervises all routing traffic, so it detects and studies new attacks against routing protocols (RIP, OSPF and BGP).
Keywords :
routing protocols; security of data; telecommunication security; telecommunication traffic; Quagga; authentication mechanisms; honeypot router; interconnecting networks; intrusion detection system; network connectivity protection; routing protocols protection; routing software; routing table; routing traffic; security techniques; Authentication; Computer crime; Computer science; Degradation; Intrusion detection; Protection; Routing protocols; Security; Software tools; Telecommunication traffic; Honeypot Router; routing attack detection; routing protocol; routing protocol protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Risks and Security of Internet and Systems (CRiSIS), 2009 Fourth International Conference on
Conference_Location :
Toulouse
ISSN :
2151-4763
Print_ISBN :
978-1-4244-4498-4
Electronic_ISBN :
2151-4763
Type :
conf
DOI :
10.1109/CRISIS.2009.5411968
Filename :
5411968
Link To Document :
بازگشت