TowerDefense: Deployment strategies for battling against IP prefix hijacking

Network Protocols(2010)

引用 17|浏览0
暂无评分
摘要
IP prefix hijacking is one of the top security threats targeting today's Internet routing protocol. Several schemes have been proposed to either detect or mitigate prefix hijacking events. However, none of these approaches is adopted and deployed on a large-scale on the Internet for reasons such as scalability, economical practicality, or unrealistic assumptions about the collaborations among ISPs. Thus there are no actionable and deployable solutions for dealing with prefix hijacking. In this paper, we study key issues related to deploying and operating an IP prefix hijacking detection and mitigation system. Our contributions include (i) deployment strategies for hijacking detection and mitigation system (named as TowerDefense): a practical service model for prefix hijacking protection and effective algorithms for selecting agent locations for detecting and mitigating prefix hijacking attacks; and (ii) large scale experiments on PlanetLab and extensive analysis on the performance of TowerDefense.
更多
查看译文
关键词
internet routing protocol,ip prefix hijacking,agent location,mitigating prefix,deployment strategy,prefix hijacking event,towerdefense,mitigation system,prefix hijacking protection,internet,ip prefix,routing protocols,telecommunication security,hijacking detection,prefix hijacking,deployment strategies,computer networks,greedy algorithms,service model,internet routing,topology,internet security
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要