Research Article | Open Access | Download PDF
Volume 4 | Issue 4 | Year 2013 | Article Id. IJCTT-V4I4P111 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I4P111
Attack Pattern Discovery for Autonomous System
V. Sukanya
Citation :
V. Sukanya, "Attack Pattern Discovery for Autonomous System," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 4, pp. 499-502, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I4P111
Abstract
The Border Gateway Protocol is a most important component of the Internet’s routing infrastructure .It is used to exchange the routing information between the Autonomous System. The BGP is the one which helps to verify the vulnerability, authenticity and also helps in prioritize the traffic .By analyzing the network traffic data, we can generate a malicious pattern and by deploying it in the BGP makes it to be more interoperable and to find the anomaly. The document proposes the need for the deployment that helps in the forensic investigation.
Keywords
Border Gateway Protocol, Autonomous System, External Border Gateway Protocol.
References
[1] J. Hruska, “Bad seed ISP Atrivo cut off from rest of the Internet,” 2008[Online].Available:http://arstechnica.com/security/news/2008/09/bad-seed-isp-atrivo-cut-off-from-rest-of-the-internet.ars
[2] B. Krebs, “Major source of online scams and spams knocked offline,” 2008 [Online]. Available: http://voices.washingtonpost.com/securityfix/2008/11/major_source_of_online_scams_a.html.
[3] S. Kent, C. Lynn, and K. Seo, “Secure Border Gateway Protocol (S-BGP),” to appear in IEEE JSAC.
[4] S. Kent, R. Atkinson, “Security Architecture for the Internet Protocol,” RFC 2401, November 1998.
[5] D. Bizeul. Russian Business Network Study. http://www.bizeul.org/files/RBN study.pdf, 2007.