On Manipulating Routing Table to Realize Redirect Attacks in O-RAN by Malicious xApp.
Chi-heng TsengCheng-Feng HungBing-Kai HongShin-Ming ChengPublished in: WPMC (2023)
Keyphrases
- routing table
- normal traffic
- ip address
- malicious users
- malicious attacks
- detect malicious
- detecting malicious
- malicious behavior
- malicious code
- malicious activities
- insider threat
- inter domain
- mobile ad hoc networks
- destination node
- malicious nodes
- routing protocol
- ddos attacks
- anomaly detection
- network traffic
- intrusion detection system