Abstract | ||
---|---|---|
Programmable packet processors have replaced traditional fixed-function custom logic in the data path of routers. This programmability introduces new vulnerabilities in these systems that can lead to new types of network attacks. We propose a modular packet processor monitoring technique that can help in detecting and avoiding such attacks. Using information about the processing time distribution of individual modules, input/output traffic characteristics can be inferred and abnormal behavior can be detected. |
Year | DOI | Venue |
---|---|---|
2011 | 10.1109/ANCS.2011.23 | Architectures for Networking and Communications Systems |
Keywords | Field | DocType |
processing time distribution,inferring packet processing behavior,output traffic characteristic,data path,individual module,abnormal behavior,new type,modular packet processor monitoring,programmable packet processor,network attack,new vulnerability,output monitors,streaming algorithms,algorithm design and analysis,streaming algorithm,algorithm design,input output,computer network security,network management | Packet analyzer,Computer science,Network packet,Network security,Computer network,Input/output,Real-time computing,Packet processing,Modular design,Network management,Processing delay | Conference |
ISBN | Citations | PageRank |
978-0-7695-4521-9 | 3 | 0.47 |
References | Authors | |
4 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Danai Chasaki | 1 | 54 | 9.63 |
Qiang Wu | 2 | 20 | 14.06 |
Tilman Wolf | 3 | 995 | 101.31 |