Analysis of intrusion detection system (IDS) in border gateway protocol

DSpace/Manakin Repository

Search OPUS

Advanced Search


My Account

Show simple item record Mujtaba, Muhammad 2013-04-17T02:17:22Z 2013-04-17T02:17:22Z 2012
dc.description University of Technology, Sydney. Faculty of Engineering and Information Technology. en_US
dc.description.abstract Border Gateway Protocol (BGP) is the de-facto inter-domain routing protocol used across thousands of Autonomous Systems (AS) joined together in the Internet. The main purpose of BGP is to keep routing information up-to-date across the Autonomous System (AS) and provide a loop free path to the destination. Internet connectivity plays a vital role in organizations such as in businesses, universities and government organisations for exchanging information. This type of information is exchanged over the Internet in the form of packets, which contain the source and destination addresses. Because the Internet is a dynamic and sensitive system which changes continuously, it is therefore necessary to protect the system from intruders. Security has been a major issue for BGP. Nevertheless, BGP suffers from serious threats even today, DoS attack is the major security threat to the Internet today, among which, is the TCP SYN flooding, the most common type of attack. The aim of this DoS attack is to consume large amounts of bandwidth. Any system connected to the Internet and using TCP services are prone to such attacks. It is important to detect such malicious activities in a network, which could otherwise cause problems for the availability of services. This thesis proposes and implements two new security methods for the protection of BGP data plane, “Analysis of BGP Security Vulnerabilities” and “Border Gateway Protocol Anomaly Detection using Failure Quality Control Method” to detect the malicious packets and the anomaly packets in the network. The aim of this work is to combine the algorithms with the Network Data Mining (NDM) method to detect the malicious packets in the BGP network. Furthermore, these patterns can be used in the database as a signature to capture the incidents in the future. en_US
dc.language.iso en en_US
dc.subject Border gateway protocol (BGP). en
dc.subject Internet security. en
dc.subject Denial of Service (DoS) attack. en
dc.subject Intrusion detection system (IDS). en
dc.subject Malicious packet detection. en
dc.subject Autonomous systems. en
dc.title Analysis of intrusion detection system (IDS) in border gateway protocol en_US
dc.type Thesis (ME) en_US
utslib.copyright.status Open Access

Files in this item

This item appears in the following Collection(s)

Show simple item record