8,507 Hits in 7.3 sec

"Roto-Rooting" your router

Danai Chasaki
2011 Proceedings of the ACM SIGCOMM 2011 conference on SIGCOMM - SIGCOMM '11  
Modern routers use general purpose programmable processors, and the software used for packet processing on these systems is potentially vulnerable to remote exploits.  ...  Our work presents the first practical example of an entirely new class of network attacks -attacks that target the network infrastructure.  ...  DEFENSE MECHANISM To defend against this type of attack on the packet processing systems of routers, we proposed a secure packet processor design [1] .  ... 
doi:10.1145/2018436.2018486 dblp:conf/sigcomm/Chasaki11 fatcat:hu3kulnk7fdpfbhgm36rrcl4ha

"Roto-Rooting" your router

Danai Chasaki
2011 Computer communication review  
Modern routers use general purpose programmable processors, and the software used for packet processing on these systems is potentially vulnerable to remote exploits.  ...  Our work presents the first practical example of an entirely new class of network attacks -attacks that target the network infrastructure.  ...  DEFENSE MECHANISM To defend against this type of attack on the packet processing systems of routers, we proposed a secure packet processor design [1] .  ... 
doi:10.1145/2043164.2018486 fatcat:aow5xxrzfjg2tchvlbmbn4wgdu

What is Green Security?

Luca Caviglione, Alessio Merlo, Mauro Migliardi
2011 2011 7th International Conference on Information Assurance and Security (IAS)  
Green Security aims at: 1) evaluating the actual security mechanisms in order to assess their energy consumption; 2) building new security mechanisms by considering energy costs from the design phase.  ...  Green Security is a new research field defining and investigating security solutions under an energy-aware perspective.  ...  For instance, the re-engineering of the devices/platforms can be unnecessary for some application, while an adaptive approach can lead to higher benefits.  ... 
doi:10.1109/isias.2011.6122781 dblp:conf/IEEEias/CaviglioneMM11 fatcat:wi6jwxxcu5gtbp5bgpkdeytenm

Risk Assessment for Identifying Intrusion in Manet

M. Siva Reddy
2013 IOSR Journal of Computer Engineering  
User training in computer and network security is crucial to the survival of modern networks, yet the methods employed to train users often seem ineffective.  ...  Hence, enhancing the security in wireless networks has become of vital importance. In this perspective of concept, we mainly study two security aspects of wireless networks.  ...  In recent years, many researchers have studied the limitations of the security mechanisms that protect wireless networks.  ... 
doi:10.9790/0661-1247578 fatcat:whlpmwvpdncyhifzofacnpfgeq

Middleware For Building Adaptive Systems Via Configuration

Sanjai Narain, Ravichander Vaidyanathan, Stanley Moyer, William Stephens, Kirthika Parmeswaran, Abdul Rahim Shareef
2001 Proceedings of the ACM SIGPLAN workshop on Languages, compilers and tools for embedded systems - LCTES '01  
Finally, as an example of configuring middleware components themselves, an example is presented from CORBA security.   ...  This Library can also simplify design of the reasoning, compilation and diagnostic tools.  ...  An algorithm for implementing an end-to-end service can be defined as the enforcement of requirements in the Library.  ... 
doi:10.1145/384197.384223 dblp:conf/lctrts/NarainVMSPS01 fatcat:trf3qqor3rbjhjhcxori2firvq

Adaptive security monitoring for next-generation routers

Christopher Mansour, Danai Chasaki
2019 EURASIP Journal on Embedded Systems  
In today's Internet, modern routers rely on high-performance reliable general-purpose multi-core packet processing systems in order to support the flexibility and the plethora of protocol operations and  ...  We propose a secure, faulttolerant, and reliable monitoring subsystem which functions in parallel with the processing core of the router and aids in the detection of attacks changing the processing behavior  ...  Availability of data and materials Please contact authors for data requests. Authors' contributions DC conceived of the study and its design and coordinated and helped to draft the manuscript.  ... 
doi:10.1186/s13639-018-0087-0 fatcat:5y5eolfa5jaoxkhmldxh7pd644

Attacks and Defenses in the Data Plane of Networks

Danai Chasaki, Tilman Wolf
2012 IEEE Transactions on Dependable and Secure Computing  
Data plane forwarding in network routers has traditionally been implemented with custom-logic hardware, but recent router designs increasingly use software-programmable network processors for packet forwarding  ...  Security issues in computer networks have focused on attacks on end-systems and the control plane. An entirely new class of emerging network attacks aims at the data plane of the network.  ...  Modern Internet routers for the network core and the network edge typically employ programmable packet processors.  ... 
doi:10.1109/tdsc.2012.50 fatcat:yum5qyigl5ehzbvdgbyzjz757q

NeuroNet: Towards an Intelligent Internet Infrastructure

Yu Chen
2008 2008 5th IEEE Consumer Communications and Networking Conference  
A distributed information collection and processing mechanism is proposed, which coordinates the activities of core network devices, monitor for anomalies, construct alerts, and initiate countermeasures  ...  Today's network security solutions designed under the end-to-end paradigm cannot address the malicious activities inside the core network effectively.  ...  Particularly, due to the lack of security functions some researchers are considering a cleanslate design for the next-generation secure Internet [4] .  ... 
doi:10.1109/ccnc08.2007.126 dblp:conf/ccnc/Chen08 fatcat:6vcmahb7offsnahb7v353dy5tu

From prey to hunter

Ang Cui, Jatin Kataria, Salvatore J. Stofo
2011 Proceedings of the 27th Annual Computer Security Applications Conference on - ACSAC '11  
of detecting and capturing successful attacks against itself for analysis.  ...  Using the Symbiote-protected router as the main component, we designed a sensor system which requires no modification to existing hardware, fully preserves the functionality of the original firmware, and  ...  Typical of the embedded security landscape, IOS is an aging system which does not employ standard protection schemes found within modern operating systems [16] , and does not have any host-based anti-virus  ... 
doi:10.1145/2076732.2076788 dblp:conf/acsac/CuiKS11 fatcat:2ykyvfyec5bvpmrixvp7urw5qi

Attacks on Network Infrastructure

Danai Chasaki, Qiang Wu, Tilman Wolf
2011 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN)  
Modern routers in computer networks use generalpurpose programmable packet processors. The software used for packet processing on these systems is potentially vulnerable to remote exploits.  ...  Index Terms-network security, network attack, programmable router, network processor, processing monitor • To our knowledge, the first practical example of a novel type of attack on routers with programmable  ...  Thus, developing defense mechanisms to protect the packet processors in router systems is critical for the continued success of the Internet.  ... 
doi:10.1109/icccn.2011.6005919 dblp:conf/icccn/ChasakiWW11 fatcat:f5b7g2tvpbelze67ovgb4tlxem

λBGP: Rethinking BGP programmability

Nicholas Hart, Charalampos Rotsos, Vasileios Giotsas, Nicholas Race, David Hutchison
2020 NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium  
Although initially designed to provide best-effort routing between ASes, the evolution of Internet services has created a demand for more complex control functionalities using the protocol.  ...  In this paper, we argue that BGP speaking systems can and should provide an open control API and a richer policy language, in order to address modern era network control requirements.  ...  Telecoms (BT) for funding the NG-CDI (EP/R004935/1) project, which supported much of the work presented in this paper.  ... 
doi:10.1109/noms47738.2020.9110331 dblp:conf/noms/HartRGRH20 fatcat:5fnj3mdjhfc77pp4ssiehbda7i

Runtime Mitigation of Packet Drop Attacks in Fault-tolerant Networks-on-Chip [article]

N Prasad, Navonil Chatterjee, Santanu Chattopadhyay, Indrajit Chakrabarti
2019 arXiv   pre-print
On the other hand, usage of third-party intellectual property blocks has made security a primary concern in modern day designs.  ...  Further, a possible design of a comprehensive secure router has been presented with a view to addressing and mitigating multiple attacks that can arise in the NoC routers.  ...  DESIGN OF A COMPREHENSIVE SECURE ROUTER Several mitigation mechanisms proposed hitherto, which aim in restoring security in NoCs, primarily address one particular a ack. is kind of a ack-speci c mitigation  ... 
arXiv:1908.00289v1 fatcat:tmmnumm4sndrxnrrizz5g4glfm

Design of a secure packet processor

Danai Chasaki, Tilman Wolf
2010 Proceedings of the 6th ACM/IEEE Symposium on Architectures for Networking and Communications Systems - ANCS '10  
Programmability in the data path of routers provides the basis for modern router implementations that can adapt to new functional requirements.  ...  We present a design and proof-of-concept implementation of a packet processing system that uses two security techniques to defend against potential attacks: a processing monitor is used to track operations  ...  the router should lead to a drop of the offending packet. • If an intrusion attempt has changed the internal state of the router, a recovery mechanism should reset the system to a secure state. • Intrusion  ... 
doi:10.1145/1872007.1872011 dblp:conf/ancs/ChasakiW10 fatcat:6odjonm4szfk3h6ktlxcjclk2a

An efficient communication architecture for commodity supercomputers

Stephan Brauss, Anton Gunzinger, Martin Frey, Martin Heimlicher, Andreas Huber, Martin Lienhard, Patrick Müller, Martin Näf, Josef Nemecek, Roland Paul
1999 Proceedings of the 1999 ACM/IEEE conference on Supercomputing (CDROM) - Supercomputing '99  
IEEE SC99 Conference (SC'99) 1-58113-091-0/99 $ 17.00 © 1999 IEEE Implementation of the Communication Network T-NET Communication Adapter The T-NET communication adapter is a 32 bit PCI adapter board with  ...  Portability means that the communication hardware and software is mainly platform independent and that a large number of modern workstations and standard operating systems can be used as they are.  ...  T-NET accomplishes this with an address translation mechanism in the communication adapter.  ... 
doi:10.1145/331532.331551 dblp:conf/sc/BraussLNGNFHHMP99 fatcat:gjeom4ojevhdrl7ranmm3tzlku

Design and Implementation of a Python-Based Active Network Platform for Network Management and Control [chapter]

Florian Baumgartner, Torsten Braun, Bharat Bhargava
2002 Lecture Notes in Computer Science  
By allowing to add new functions to network devices it improves the performance of Internet routers, and simplifies the introduction and maintenance of new services.  ...  To show the capabilities of the approach, two different quality of service related applications, that is a simple multicast algorithm and an approach to automatically set up tunnels, have been implemented  ...  Acknowledgment The work described in this paper is a part of the work done at the University of Bern in the project 'Quality of Service Support for the Internet Based on Intelligent Network Elements' funded  ... 
doi:10.1007/3-540-36199-5_14 fatcat:m3r7gtjmjbgbrfoyho6d3nt7iq
« Previous Showing results 1 — 15 out of 8,507 results