Sciweavers

SP
2000
IEEE

Using Conservation of Flow as a Security Mechanism in Network Protocols

13 years 9 months ago
Using Conservation of Flow as a Security Mechanism in Network Protocols
The law of Conservation of Flow, which states that an input must either be absorbed or sent on as an output (possibly with modification), is an attractive tool with which to analyze network protocols for security properties. One of its uses is to detect disruptive network elements that launch Denial of Service attacks by absorbing or discarding packets. Its use requires several assumptions about the protocols being analyzed. In this paper, we examine the WATCHERS algorithm to detect misbehaving routers. We show that it uses Conservation of Flow without sufficient verification of its assumptions, and can consequently be defeated. We suggest improvements to make the use of Conservation of Flow valid.
John R. Hughes, Tuomas Aura, Matt Bishop
Added 01 Aug 2010
Updated 01 Aug 2010
Type Conference
Year 2000
Where SP
Authors John R. Hughes, Tuomas Aura, Matt Bishop
Comments (0)