Security problems in the TCP/IP protocol suite
ACM SIGCOMM Computer Communication Review
Improving Network Infrastructure Security by Partitioning Networks Running Spanning Tree Protocol
ICISP '06 Proceedings of the International Conference on Internet Surveillance and Protection
Toward Secure Routing Infrastructures
IEEE Security and Privacy
Comparative study of blocking mechanisms for packet switched Omega networks
EHAC'07 Proceedings of the 6th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications
Securing the Internet routing infrastructure
IEEE Communications Magazine
Detecting disruptive routers: a distributed network monitoring approach
IEEE Network: The Magazine of Global Internetworking
Internet infrastructure security: a taxonomy
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Triangle routing is one of the serious attacks to the Internet infrastructure. It can be caused by malicious routers which misroute packets to wrong directions. This kind of attacks creates network problems such as network congestion, denial of service and network partition and results in degrade of network performance. This paper gives a comprehensive study on how the path analysis combats the triangle routing attacks. We discuss the method, implementation and limitation of path analysis to detect triangle routing in IPv4 network. We also discuss the implementation of path analysis in IPv6 by proposing a new extension header, called Record Path Header.