Attack Pattern Discovery for Autonomous System

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - April Issue 2013 by IJCTT Journal
Volume-4 Issue-4                           
Year of Publication : 2013
Authors :V. Sukanya

MLA

V. Sukanya "Attack Pattern Discovery for Autonomous System"International Journal of Computer Trends and Technology (IJCTT),V4(4):499-502 April Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: -The Border Gateway Protocol is a most important component of the Internet’s routing infrastructure .It is used to exchange the routing information between the Autonomous System. The BGP is the one which helps to verify the vulnerability, authenticity and also helps in prioritize the traffic .By analyzing the network traffic data, we can generate a malicious pattern and by deploying it in the BGP makes it to be more interoperable and to find the anomaly. The document proposes the need for the deployment that helps in the forensic investigation.

References-

[1] J. Hruska, “Bad seed ISP Atrivo cut off from rest of the Internet,” 2008[Online].Available:http://arstechnica.com/security/news/2008/09/bad-seed-isp-atrivo-cut-off-from-rest-of-the-internet.ars
[2] B. Krebs, “Major source of online scams and spams knocked offline,” 2008 [Online]. Available: http://voices.washingtonpost.com/securityfix/2008/11/major_source_of_online_scams_a.html.
[3] S. Kent, C. Lynn, and K. Seo, “Secure Border Gateway Protocol (S-BGP),” to appear in IEEE JSAC.
[4] S. Kent, R. Atkinson, “Security Architecture for the Internet Protocol,” RFC 2401, November 1998.
[5] D. Bizeul. Russian Business Network Study. http://www.bizeul.org/files/RBN study.pdf, 2007.

Keywords — Border Gateway Protocol, Autonomous System, External Border Gateway Protocol