Detecting distributed signature-based intrusion: The case of multi-path routing attacks
- Submitting institution
-
Imperial College of Science, Technology and Medicine
- Unit of assessment
- 11 - Computer Science and Informatics
- Output identifier
- 2179
- Type
- E - Conference contribution
- DOI
-
10.1109/INFOCOM.2015.7218423
- Title of conference / published proceedings
- Proceedings IEEE INFOCOM 2015
- First page
- 558
- Volume
- 26
- Issue
- -
- ISSN
- 0743-166X
- Open access status
- Out of scope for open access requirements
- Month of publication
- August
- Year of publication
- 2015
- URL
-
-
- Supplementary information
-
-
- Request cross-referral to
- -
- Output has been delayed by COVID-19
- No
- COVID-19 affected output statement
- -
- Forensic science
- No
- Criminology
- No
- Interdisciplinary
- No
- Number of additional authors
-
3
- Research group(s)
-
-
- Citation count
- -
- Proposed double-weighted
- No
- Reserve for an output with double weighting
- No
- Additional information
- The first solution to a well-known open problem, reported by the IETF community (https://tools.ietf.org/html/rfc6181), on failure of established open-source S-IDS Snort in detecting signature-based attacks in multi-path routing protocols. It has led to two years funding (£165K) from US/UK ITA programme in collaboration with IBM US. Results raised interest in the industrial community (email communication with Catherine (Kate) Pearce, Senior Security Consultant, Cisco Services). INFOCOMM’15 acceptance rate: 19%/1634.
- Author contribution statement
- -
- Non-English
- No
- English abstract
- -