Filters








1,112 Hits in 3.9 sec

A light-weight distributed scheme for detecting ip prefix hijacks in real-time

Changxi Zheng, Lusheng Ji, Dan Pei, Jia Wang, Paul Francis
2007 Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '07  
As more and more Internet IP prefix hijacking incidents are being reported, the value of hijacking detection services has become evident.  ...  Most of the current hijacking detection approaches monitor IP prefixes on the control plane and detect inconsistencies in route advertisements and route qualities.  ...  Detection Latency. Next, we evaluate how fast our detection algorithm can detect a hijack.  ... 
doi:10.1145/1282380.1282412 dblp:conf/sigcomm/ZhengJPWF07 fatcat:b5xvrtqsrvcrjihqxy3bsfs3sy

A light-weight distributed scheme for detecting ip prefix hijacks in real-time

Changxi Zheng, Lusheng Ji, Dan Pei, Jia Wang, Paul Francis
2007 Computer communication review  
As more and more Internet IP prefix hijacking incidents are being reported, the value of hijacking detection services has become evident.  ...  Most of the current hijacking detection approaches monitor IP prefixes on the control plane and detect inconsistencies in route advertisements and route qualities.  ...  Detection Latency. Next, we evaluate how fast our detection algorithm can detect a hijack.  ... 
doi:10.1145/1282427.1282412 fatcat:otxaj3f3mjcijmz64m2d6ofhyy

Server Location Verification and Server Location Pinning: Augmenting TLS Authentication [article]

AbdelRahman Abdou, P.C. van Oorschot
2016 arXiv   pre-print
We explain how SLV is compatible with the increasing trends of geographically distributed content dissemination over the Internet, without causing any new interoperability conflicts.  ...  For the security properties, SLV (row 1) provides both the benefit of detecting global MitM attacks, regardless of how the adversary hijacks traffic (recall Section 2.1), and of detecting a subset of local  ...  traffic hijacking.  ... 
arXiv:1608.03939v2 fatcat:cwvzp26effhjljirh3ag6tn6ni

Crowd-based detection of routing anomalies on the internet

Rahul Hiran, Niklas Carlsson, Nahid Shahmehri
2015 2015 IEEE Conference on Communications and Network Security (CNS)  
The Internet is highly susceptible to routing attacks and there is no universally deployed solution that ensures that traffic is not hijacked by third parties.  ...  Individuals or organizations wanting to protect themselves from sustained attacks must therefore typically rely on measurements and traffic monitoring to detect attacks.  ...  traffic hijacks to operators and other organizations that can help enforce route security.  ... 
doi:10.1109/cns.2015.7346850 dblp:conf/cns/HiranCS15 fatcat:qyihgs2l35btfky62ufi2tmpra

Accurate Real-time Identification of IP Prefix Hijacking

Xin Hu, Z. Morley Mao
2007 2007 IEEE Symposium on Security and Privacy (SP '07)  
We present novel and practical techniques to accurately detect IP prefix hijacking attacks in real time to facilitate mitigation.  ...  The key insight is to use data plane information in the form of edge network fingerprinting to disambiguate suspect IP hijacking incidences based on routing anomaly detection.  ...  Both types of hijacking can significantly disrupt the stability and security of the Internet.  ... 
doi:10.1109/sp.2007.7 dblp:conf/sp/HuM07 fatcat:dr7ct5l7wvhsdnr65nlw5jozty

BGP eye

Soon Tee Teoh, Supranamaya Ranjan, Antonio Nucci, Chen-Nee Chuah
2006 Proceedings of the 3rd international workshop on Visualization for computer security - VizSEC '06  
Second, we provide a Home-Centric view from AS6458 of the routing outages caused by the inadvertent prefix hijacking by AS9121 on December 24th, 2004.  ...  First, we provide an Internet-Centric view from AS568 of the routing outages during the spread of the Slammer Worm on January 25th, 2003.  ...  Path distance based layout: The second layout method starts by detecting all the source and sink nodes.  ... 
doi:10.1145/1179576.1179593 dblp:conf/vizsec/TeohRNC06 fatcat:66i5otbbx5fwzcwaoptoaez3m4

A Geometric Approach for Real-time Monitoring of Dynamic Large Scale Graphs: AS-level graphs illustrated [article]

Loqman Salamatian, Dali Kaafar, Kavé Salamatian
2018 arXiv   pre-print
In particular, we use our method to detect major events and changes via the geometry of the embedding of the graph.  ...  may be overlooked during monitoring can result in splitting the graph into two disconnected components.  ...  These changes can be interpreted via the so-called optimal transport, thus giving a detailed picture of how a change will affect the global network traffic.  ... 
arXiv:1806.00676v1 fatcat:glcgm2yylraivjmdbdn73amt5u

Collaborative framework for protection against attacks targeting BGP and edge networks

Rahul Hiran, Niklas Carlsson, Nahid Shahmehri
2017 Computer Networks  
We also include an evaluation of which ASes need to collaborate, to what extent the size and locality of ASes matter, and how many ASes are needed to achieve good efficiency in detecting anomalous route  ...  Our results show that PrefiSec helps improve system security, and can scale to large systems.  ...  Collaborative alert mechanisms for interception attacks (Section 5): Hijacked traffic is even more difficult to detect if the intercepted traffic is rerouted to the intended destination.  ... 
doi:10.1016/j.comnet.2017.04.048 fatcat:qeblxmwhqba5ndryft5cjpas5a

How secure are secure interdomain routing protocols

Sharon Goldberg, Michael Schapira, Peter Hummon, Jennifer Rexford
2010 Computer communication review  
We prove that finding the most damaging strategy is NP-hard, and show how counterintuitive strategies, like announcing longer paths, announcing to fewer neighbors, or triggering BGP loop-detection, can  ...  Finally, we find that a clever export policy can often attract almost as much traffic as a bogus path announcement.  ...  We now show how the manipulator can attract traffic from an additional 360 ASes by using a clever 'false-loop prefix hijack' attack.  ... 
doi:10.1145/1851275.1851195 fatcat:v4xkmeducjazrip4jpzposj2ny

How secure are secure interdomain routing protocols

Sharon Goldberg, Michael Schapira, Peter Hummon, Jennifer Rexford
2010 Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM - SIGCOMM '10  
We prove that finding the most damaging strategy is NP-hard, and show how counterintuitive strategies, like announcing longer paths, announcing to fewer neighbors, or triggering BGP loop-detection, can  ...  Finally, we find that a clever export policy can often attract almost as much traffic as a bogus path announcement.  ...  Attract more by gaming loop detection! To show that the identity of the ASes on the announced path can affect the amount of attracted traffic, our last example involves gaming BGP loop detection.  ... 
doi:10.1145/1851182.1851195 dblp:conf/sigcomm/GoldbergSHR10 fatcat:gpl3eyhfjvhsjnqliodr6qjqsu

Can MPTCP secure Internet communications from man-in-the-middle attacks?

Ho-Dac-Duy Nguyen, Chi-Dung Phung, Stefano Secci, Benevid Felix, Michele Nogueira
2017 2017 13th International Conference on Network and Service Management (CNSM)  
How interesting would it be using MPTCP to exploit multiple Internet-scale paths hence decreasing the probability of man-in-the-middle (MITM) attacks is a question to which we try to answer.  ...  Internet destination.  ...  Nevertheless, such practices can have a gain which can be hardly assessed: how can you ensure the upstream source-destination traffic does follow disjoint paths, hence decrease MITM efficiency, if not  ... 
doi:10.23919/cnsm.2017.8255970 dblp:conf/cnsm/NguyenPSFN17 fatcat:6wzl5jxeubaz5jga4kg5bs7yhu

Can MPTCP Secure Internet Communications from Man-in-the-Middle Attacks? [article]

Ho-Dac-Duy Nguyen, Chi-Dung Phung, Stefano Secci, Benevid Felix
2017 arXiv   pre-print
How interesting would it be using MPTCP to exploit multiple Internet-scale paths hence decreasing the probability of man-in-the-middle (MITM) attacks is a question to which we try to answer.  ...  Internet destination.  ...  Nevertheless, such practices can have a gain which can be hardly assessed: how can you ensure the upstream source-destination traffic does follow disjoint paths, hence decrease MITM efficiency, if not  ... 
arXiv:1704.07154v1 fatcat:hjcg36blerhczpzd3awnxotzyi

Detecting DNS Root Manipulation [chapter]

Ben Jones, Nick Feamster, Vern Paxson, Nicholas Weaver, Mark Allman
2016 Lecture Notes in Computer Science  
We present techniques for detecting unauthorized DNS root servers in the Internet using primarily endpoint-based measurements from RIPE Atlas, supplemented with BGP routing announcements from RouteViews  ...  The first approach analyzes the latency to the root server and the second approach looks for route hijacks.  ...  The first method interposes a middlebox to intercept DNS traffic bound for root servers.  ... 
doi:10.1007/978-3-319-30505-9_21 fatcat:hxoehcc46vemhnaxdqc4q3rcwy

Attacking the Quantum Internet

Takahiko Satoh, Shota Nagayama, Shigeya Suzuki, Takaaki Matsuo, Michal Hajdusek, Rodney Van Meter
2021 IEEE Transactions on Quantum Engineering  
INDEX TERMS Quantum Internet, Quantum network security.  ...  The main service provided by the coming Quantum Internet will be creating entanglement between any two quantum nodes.  ...  ACKNOWLEDGMENT The authors acknowledge members of the Quantum Internet Task Force (QITF), a research consortium working to realize the Quantum Internet, and participants in the Quantum Internet Research  ... 
doi:10.1109/tqe.2021.3094983 fatcat:vaf742pwmrgjng3jw5u2g64zzi

A Survey of BGP Security Issues and Solutions

K. Butler, T.R. Farley, P. McDaniel, J. Rexford
2010 Proceedings of the IEEE  
The Border Gateway Protocol (BGP) controls much of Internet traffic, but is vulnerable to communications interruptions and failures; finding suitable improved security measures with acceptable costs is  ...  Recent high-profile outages and security analyses clearly indicate that the Internet routing infrastructure is highly vulnerable.  ...  Subsequent work investigates how to optimally place route monitors within the Internet to maximize prefix hijacking detection coverage [97] .  ... 
doi:10.1109/jproc.2009.2034031 fatcat:55lyamp4vbhq5dqwipcima5q2i
« Previous Showing results 1 — 15 out of 1,112 results