skip to main content
10.1145/3670105.3670796acmotherconferencesArticle/Chapter ViewAbstractPublication PagescniotConference Proceedingsconference-collections
research-article
Open access

An example of peer-to-peer network surveillance systems preventing man-in-the-middle attack

Published: 29 July 2024 Publication History

Abstract

The modern dynamic routing protocols such as OSPF, EIGRP and RIP have been succeeding in protecting our network infrastructures from traffic congestions which are brought about by routing loops and packet oscillatons. Actually, it sometimes happens that the network traffic has been suspended by a large number of packets circulating clockwise and counterclockwise simultaneously on bounded and closed circuits. Though many network administrators are apt to regard these network traffic congestions as spontaneous and temporary ones, is it true that all the unexpected routing loops are brought about spontaneously by a certaion human error?
Generally speaking, routing loops which have been brought about by q certain human error are mainly due to the hardware fatigue with which the network devices are equipped or due to the network administrators’ carelessness. Actually, there are some other routing loops which have been broght about by artificial and intentional operations.
In the former half of this paper, we discuss the problem asking whether or not intentional routing loops can be brought about because artificially changed routes are apt to be used for the man-in-the-middle attacks. Moreover, in the latter half of this paper, we apply the answer to this problem to detecting existence of. the man-in-the-middle attacks without using network security surveillance servers.

References

[1]
[1] O. Santos and J. Muniz, CCNA Cyber Ops Secfnd 210-250, Cisco Press, Indianapolis, 1st edition, 2017.
[2]
[2] O. Santos and J. Muniz, CCNA Cyber Ops Secfnd 210-255, Cisco Press, Indianapolis, 1st edition, 2017.
[3]
[3] D. E. Knuth, The Art of Computer Programming, Addison-Wesley Publishing Company, Massachusetts, 2nd edition, 1973.
[4]
[4] K. Jan, B. R. Ben, K. Mario, A. Gianni, Y. Minlan, M. Michael, Detecting Routing Loops in the Data Plane, Proceedings of the 16th International Conference on Emerging Networking Experiments and Technologies, New York, NY, USA, Association for Computing Machinery, pp. 466–473. ISBN 978-1-4503-7948-9.
[5]
[5] What is Routing Loop and How to Avoid Routing Loop?, GeeksforGeeks, 2022, https://www.geeksforgeeks.org/what-is-routing-loop-and-how-to-avoid-routing-loop/
[6]
[6] C. Hildebrand, CSO Expert Insights Into Cybersecurity and Network Visibility Trends, -What is a Reflection/Amplification DDoS Attack?-, 2021, https://www.csoonline.com/article/571193/what-is-a-reflection-amplification-ddos-attack.html

Index Terms

  1. An example of peer-to-peer network surveillance systems preventing man-in-the-middle attack

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CNIOT '24: Proceedings of the 2024 5th International Conference on Computing, Networks and Internet of Things
    May 2024
    668 pages
    ISBN:9798400716751
    DOI:10.1145/3670105
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 29 July 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Dynamic routing
    2. Longest prefix matching rule
    3. Man-in-the-middle attack
    4. Routing loop
    5. Static routing

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    CNIOT 2024

    Acceptance Rates

    Overall Acceptance Rate 39 of 82 submissions, 48%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 187
      Total Downloads
    • Downloads (Last 12 months)187
    • Downloads (Last 6 weeks)39
    Reflects downloads up to 15 Feb 2025

    Other Metrics

    Citations

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Login options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media