Real-time protocol analysis for detecting link-state routing protocol attacks

  • Authors:
  • Ho-Yen Chang;S. Felix Wu;Y. Frank Jou

  • Affiliations:
  • Ericsson IP Infrastructure, Raleigh, NC;Univ. of California at Davis, Davis;Advanced Networking Research, MCNC, RTP, NC

  • Venue:
  • ACM Transactions on Information and System Security (TISSEC)
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

A real-time knowledge-based network intrusion-detection model for a link-state routing protocol is presented for the OSPF protocol. This model includes three layers: a data process layer to parse packets and dispatch data; and event abstractor to abstract predefined real-time events for the link-state routing protocol; and an extended timed finite state machine to express the real-time behavior of the protocol engine and to detect intrusions by pattern matching. The timed FSM, called the JiNao Finite State Machine (JFSM) is extended from the conventional FSM with timed states, multiple timers, and time constraints on state transitions. The JFSM is implemented as a generator that can create and FSM by constructing the configuration file only. The results show that this approach is very effective for detecting real-time intrusions. Our approach can be extended for use in other network protocol intrusion-detection systems, especially for those with known attacks.