Title :
Study on IP Prefix Hijacking in Cloud Computing Networks Based on Attack Planning
Author :
Liu, Yujing ; Peng, Wei ; Su, Jinshu
Author_Institution :
Sch. of Comput., Nat. Univ. of Defense Technol. (NUDT), Changsha, China
Abstract :
Due to the great dependence on Internet routing infrastructure, cloud services are vulnerable to IP prefix hijacking attacks which can destroy the confidentiality and integrity of user data. It is important to understand what impact a prefix hijacking attack can cause and how the number and locations of participants can affect the attacking results. In this paper, considering both attacking and detecting, we innovatively model this problem as an attack planning task, and solve it by applying a genetic algorithm. By analyzing the best solution to the problem, we find that the type of victims plays a more important role in IP prefix hijacking than that of attackers. We also find that attackers can gain great impact even when the prefixes of a small number of victims are hijacked. For attack planning, the degree of an AS is a major criterion to be considered. These findings are useful for securing cloud computing networks by preventing and eliminating IP prefix hijacking.
Keywords :
IP networks; cloud computing; computer network security; data integrity; genetic algorithms; network routing; IP prefix hijacking attacks; Internet routing; attack detection; attack planning; cloud computing network security; data confidentiality; data integrity; genetic algorithm; Cloud computing; Genetic algorithms; IP networks; Planning; Routing; Servers; IP prefix hijacking; attack planning; cloud computing; genetic algorithm;
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on
Conference_Location :
Changsha
Print_ISBN :
978-1-4577-2135-9
DOI :
10.1109/TrustCom.2011.127