Recovery from DoS Attacks in MIPv6: Modelling and Validation


Autoria(s): Manish Kumar, C; Gopinath, K
Data(s)

15/10/2007

Resumo

Denial-of-service (DoS) attacks form a very important category of security threats that are prevalent in MIPv6 (mobile internet protocol version 6) today. Many schemes have been proposed to alleviate such threats, including one of our own [9]. However, reasoning about the correctness of such protocols is not trivial. In addition, new solutions to mitigate attacks may need to be deployed in the network on a frequent basis as and when attacks are detected, as it is practically impossible to anticipate all attacks and provide solutions in advance. This makes it necessary to validate the solutions in a timely manner before deployment in the real network. However, threshold schemes needed in group protocols make analysis complex. Model checking threshold-based group protocols that employ cryptography have not been successful so far. Here, we propose a new simulation based approach for validation using a tool called FRAMOGR that supports executable specification of group protocols that use cryptography. FRAMOGR allows one to specify attackers and track probability distributions of values or paths. We believe that infrastructure such as FRAMOGR would be required in future for validating new group based threshold protocols that may be needed for making MIPv6 more robust.

Formato

application/pdf

Identificador

http://eprints.iisc.ernet.in/41477/1/Recovery_from_DoS.pdf

Manish Kumar, C and Gopinath, K (2007) Recovery from DoS Attacks in MIPv6: Modelling and Validation. In: Fifth IEEE International Conference on Software Engineering and Formal Methods, 10-14 Sept. 2007 , London .

Publicador

IEEE

Relação

http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4343937

http://eprints.iisc.ernet.in/41477/

Palavras-Chave #Computer Science & Automation (Formerly, School of Automation)
Tipo

Conference Paper

PeerReviewed