Router Attacks-Detection And Defense Mechanisms
Journal: International Journal of Scientific & Technology Research (Vol.2, No. 6)Publication Date: 2013-06-25
Authors : Saili Waichal; B.B.Meshram;
Page : 145-149
Keywords : Index Terms Access Control lists; Regular Expression Matching; Router Attacks; Router Debugging; Router Logs; Router Security; Syslog.;
Abstract
Abstract Router is one of the most important components of any network. Their main aim is taking routing decision to forward a packet to its destination. It can be a home or small office router which takes your traffic on the internet or it can also be one of the core routers which form the backbone of the internet. Being such an important component routers are often targeted for attacks. It thus becomes necessary to apply some kind of security mechanism to protect them. This paper gives a survey of different methods for router management and security. The aim is to detect any anomalous behavior of router which can lead to collapse of entire network. It then focuses on using an excellent in built feature available in almost any machine like router or web server or mail server or switch or database server which is LOGS Proper analysis of logs that are generated can be extremely useful for detecting any anomalous behavior of the router. Thus logs can provide us huge information for solving a misconfiguration on router or detect an intrusion on the system. In this paper we give details about how to use router logs for attacks detection and defense.
Other Latest Articles
- Informative Content Extraction By Using Eifce Effective Informative Content Extractor
- Embedded Cloud For Antipiracy
- Influence Of Family Size On Parental Involvement In Public Pre-School Education In Turbo Division Kenya
- Drug Abuse Among The Youth In Kenya
- Exit Voice Loyalty Theory Its Implications For Household And National Level Dynamics In Kenya
Last modified: 2013-08-10 23:36:18