ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Router Attacks-Detection And Defense Mechanisms

Journal: International Journal of Scientific & Technology Research (Vol.2, No. 6)

Publication Date:

Authors : ; ;

Page : 145-149

Keywords : Index Terms Access Control lists; Regular Expression Matching; Router Attacks; Router Debugging; Router Logs; Router Security; Syslog.;

Source : Downloadexternal Find it from : Google Scholarexternal


Abstract Router is one of the most important components of any network. Their main aim is taking routing decision to forward a packet to its destination. It can be a home or small office router which takes your traffic on the internet or it can also be one of the core routers which form the backbone of the internet. Being such an important component routers are often targeted for attacks. It thus becomes necessary to apply some kind of security mechanism to protect them. This paper gives a survey of different methods for router management and security. The aim is to detect any anomalous behavior of router which can lead to collapse of entire network. It then focuses on using an excellent in built feature available in almost any machine like router or web server or mail server or switch or database server which is LOGS Proper analysis of logs that are generated can be extremely useful for detecting any anomalous behavior of the router. Thus logs can provide us huge information for solving a misconfiguration on router or detect an intrusion on the system. In this paper we give details about how to use router logs for attacks detection and defense.

Last modified: 2013-08-10 23:36:18