22.07.2013 Views

Download File - Computer Networks & Information Security

Download File - Computer Networks & Information Security

Download File - Computer Networks & Information Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Intrusion Detection [Zhang00Mobicom]<br />

Detection of abnormal routing table updates<br />

Uses “training” data to determine characteristics of normal<br />

routing table updates (such as rate of change of routing info)<br />

Efficacy of this approach is not evaluated, and is debatable<br />

Similar abnormal behavior may be detected at other<br />

protocol layers<br />

For instance, at the MAC layer, normal behavior may be<br />

characterized for access patterns by various hosts<br />

Abnormal behavior may indicate intrusion<br />

Solutions proposed in [Zhang00Mobicom] are<br />

preliminary, not enough detail provided<br />

405

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!