Internet is the foundation of cyberspace. Modern networks such as Internet of vehicles work based on the infrastructure of Internet and use the basic protocols to transfer data. The heterogeneous entities participating in network interactions may vary greatly and their behaviors are quite different. As a result, how to ensure the semantic consistency during the interactions between different network entities and avoid exploitable vulnerabilities are critical to ensure the security and reliability of the Internet. After analyzing the cross-layer interactions of network protocols, this report will introduce a new type of security problems arising during the cross-layer interactions in network stacks, i.e., semantic ambiguity, information leakage and semantic gap. A new detection method over malicious traffic based on frequency domain analysis will also be presented in this report, which can be used to improve the security of information interactions effectively.
Protocol stack security and malicious traffic detection
EB2012-IBC-004 • Paper • EuroBrake 2012 • IBC
Upgrade your ICC subscription to access all Library items.
Congratulations! Your ICC subscription gives you complete access to the FISITA Library.
Available for purchase on the FISITA Store