DocumentCode :
3075420
Title :
TowerDefense: Deployment strategies for battling against IP prefix hijacking
Author :
Qiu, Tongqing ; Ji, Lusheng ; Pei, Dan ; Wang, Jia ; Xu, Jun Jim
Author_Institution :
Coll. of Comput., Georgia Inst. of Technol., Atlanta, GA, USA
fYear :
2010
fDate :
5-8 Oct. 2010
Firstpage :
134
Lastpage :
143
Abstract :
IP prefix hijacking is one of the top security threats targeting today´s Internet routing protocol. Several schemes have been proposed to either detect or mitigate prefix hijacking events. However, none of these approaches is adopted and deployed on a large-scale on the Internet for reasons such as scalability, economical practicality, or unrealistic assumptions about the collaborations among ISPs. Thus there are no actionable and deployable solutions for dealing with prefix hijacking. In this paper, we study key issues related to deploying and operating an IP prefix hijacking detection and mitigation system. Our contributions include (i) deployment strategies for hijacking detection and mitigation system (named as TowerDefense): a practical service model for prefix hijacking protection and effective algorithms for selecting agent locations for detecting and mitigating prefix hijacking attacks; and (ii) large scale experiments on PlanetLab and extensive analysis on the performance of TowerDefense.
Keywords :
Internet; routing protocols; telecommunication security; IP prefix hijacking; Internet routing protocol; TowerDefense; deployment strategies; Greedy algorithms; IP networks; Internet; Mirrors; Poles and towers; Routing protocols; Topology;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network Protocols (ICNP), 2010 18th IEEE International Conference on
Conference_Location :
Kyoto
ISSN :
1092-1648
Print_ISBN :
978-1-4244-8644-1
Type :
conf
DOI :
10.1109/ICNP.2010.5762762
Filename :
5762762
Link To Document :
بازگشت