[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/ICNP.2010.5762762guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

TowerDefense: Deployment strategies for battling against IP prefix hijacking

Published: 05 October 2010 Publication History

Abstract

IP prefix hijacking is one of the top security threats targeting today's Internet routing protocol. Several schemes have been proposed to either detect or mitigate prefix hijacking events. However, none of these approaches is adopted and deployed on a large-scale on the Internet for reasons such as scalability, economical practicality, or unrealistic assumptions about the collaborations among ISPs. Thus there are no actionable and deployable solutions for dealing with prefix hijacking. In this paper, we study key issues related to deploying and operating an IP prefix hijacking detection and mitigation system. Our contributions include (i) deployment strategies for hijacking detection and mitigation system (named as TowerDefense): a practical service model for prefix hijacking protection and effective algorithms for selecting agent locations for detecting and mitigating prefix hijacking attacks; and (ii) large scale experiments on PlanetLab and extensive analysis on the performance of TowerDefense.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
ICNP '10: Proceedings of the The 18th IEEE International Conference on Network Protocols
October 2010
321 pages
ISBN:9781424486441

Publisher

IEEE Computer Society

United States

Publication History

Published: 05 October 2010

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)A Practical Heartbeat-based Defense Scheme Against Cloning Attacks in PoA BlockchainComputer Standards & Interfaces10.1016/j.csi.2022.10365683:COnline publication date: 1-Jan-2023
  • (2021)How Distance-Bounding Can Detect Internet Traffic HijackingCryptology and Network Security10.1007/978-3-030-92548-2_19(355-371)Online publication date: 13-Dec-2021
  • (2018)ARTEMISIEEE/ACM Transactions on Networking10.1109/TNET.2018.286979826:6(2471-2486)Online publication date: 1-Dec-2018
  • (2011)The K-observer problem in computer networksProceedings of the 13th international conference on Stabilization, safety, and security of distributed systems10.5555/2050613.2050616(5-18)Online publication date: 10-Oct-2011

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media