This repository contains code and resources related to our paper titled "Anomaly Detection in In-Network Fast ReRoute Systems" We propose a novel mechanism to detect malicious traffic patterns targeting fast reroute systems, which can compromise network performance and lead to degradation.
To get started with using the attack detection mechanism, follow these steps:
src
directory.Review the dependencies\
before deploying the attack detection mechanism in your network environment. Instructions present in the README files.
We welcome contributions from researchers and practitioners interested in enhancing the security of fast reroute systems. Whether it's code improvements, additional attack scenarios, or further validation, your input is valuable in fortifying network resilience against malicious threats.
This work is supported by the National Security Council Secretariat (NSCS), India, and the Prime Minister's Research Fellowship (PMRF) program, India.
If you find our work useful in your research, please feel free to cite our paper.
Additionally, you may find our following work relevant:
SA Harish, Divya Pathak, Mahanth Kumar Valluri, Sree Prathyush Chinta, Amogh Bedarakota, Rinku Shah, Praveen Tammana. "Securing In-Network Fast Control Loop Systems from Adversarial Attacks." In 16th International Conference on COMmunication Systems & NETworkS (COMSNETS), IEEE, 2024. Link to paper
Feel free to raise issues, submit pull requests, or reach out to us here with any questions or suggestions.