Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2245276.2245394acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Automatic creation of VPN backup paths for improved resilience against BGP-attackers

Published: 26 March 2012 Publication History

Abstract

Virtual private networks (VPNs) play an integral role in corporate and governmental communication systems nowadays. As such they are by definition an exposed target for attacks on the availability of whole communication infrastructures. A comparably effective way to disturb VPNs is the announcement of the involved IP address ranges by compromised BGP routers. Since in the foreseeable future criminals may focus on such attacks, this article discusses the intelligent creation of backup paths in the context of VPNs as a countermeasure. The proposed system is evaluated in simulations as well as in a prototypic environment.

References

[1]
The Cooperative Association for Internet Data Analysis (CAIDA), 2011.
[2]
D. Andersen, H. Balakrishnan, F. Kaashoek, and R. Morris. Resilient Overlay Networks. In SOSP '01: Proceedings of the eighteenth ACM symposium on Operating systems principles, pages 131--145, 2001.
[3]
D. Andersen, A. Snoeren, and H. Balakrishnan. Best-path vs. multi-path overlay routing. In Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement, pages 91--100. ACM, 2003.
[4]
D. G. Andersen, H. Balakrishnan, M. F. Kaashoek, and R. Morris. The Case for Resilient Overlay Networks. In Proc. of the 8th Annual Workshop on Hot Topics in Operating Systems, pages 152--157, 2001.
[5]
A. Collins. The Detour Framework for Packet Rerouting. PhD thesis, University of Washington, 1998.
[6]
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to algorithms, chapter 15.4 Longest Common Subsequence, pages 390--397. The MIT press, 3rd edition, 2009.
[7]
J. Cowie, A. Ogielski, B. Premore, and Y. Yuan. Internet worms and global routing instabilities. In Proceedings of SPIE, volume 4868, page 195, 2002.
[8]
D. Danchev. Coordinated Russia vs Georgia cyber attack in progress, Aug. 2008.
[9]
Forrester Consulting. The Trends And Changing Landscape Of DDoS Threats And Protection, July 2009.
[10]
P. B. Gentry. What is a VPN? Information Security Technical Report, 6(1): 15--22, 2001.
[11]
C. Labovitz, A. Ahuja, A. Bose, and F. Jahanian. Delayed Internet routing convergence. ACM SIGCOMM Computer Communication Review, 30(4): 175--187, 2000.
[12]
V. Levenshtein. Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics Doklady, 10: 707--710, 1966.
[13]
S. Mansfield-Devine. Anonymous: serious threat or mere annoyance? Network Security, 2011(1): 4--10, 2011.
[14]
R. Musunuri and J. A. Cobb. An overview of solutions to avoid persistent BGP divergence. IEEE Network, 19(6): 28--34, 2005.
[15]
A. Nakao, L. Peterson, and A. Bavier. A routing underlay for overlay networks. In Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, pages 11--18. ACM, 2003.
[16]
V. Paxson. End-to-end routing behavior in the internet. SIGCOMM Comput. Commun. Rev., 26(4): 25--38, August 1996.
[17]
V. Paxson. End-to-end internet packet dynamics. SIGCOMM Comput. Commun. Rev., 27(4): 139--152, October 1997.
[18]
M. Rossberg, G. Schaefer, and T. Strufe. Distributed Automatic Configuration of Complex IPsec-Infrastructures. Journal of Network and Systems Management, 18(3): 300--326, 2010.
[19]
S. Savage, T. Anderson, A. Aggarwal, D. Becker, N. Cardwell, A. Collins, E. Hoffman, J. Snell, A. Vahdat, G. Voelker, et al. Detour: Informed Internet Routing and Transport. IEEE Micro, 19(1): 50--59, 1999.
[20]
S. Savage, A. Collins, E. Hoffman, J. Snell, and T. Anderson. The End-to-End Effects of Internet Path Selection. Computer Communication Review, 29(4): 289--299, 1999.
[21]
D. Sontag, Y. Zhang, A. Phanishayee, D. G. Andersen, and D. Karger. Scaling All-Pairs Overlay Routing. In Proceedings of the 5th international conference on Emerging networking experiments and technologies (CoNEXT), pages 145--156, 2009.

Cited By

View all
  • (2016)Improved Calculation of aS Resilience against IP Prefix Hijacking2016 IEEE 41st Conference on Local Computer Networks Workshops (LCN Workshops)10.1109/LCN.2016.037(121-128)Online publication date: Nov-2016
  • (2016)Backup paths for multiple demands in overlay networks2016 Global Information Infrastructure and Networking Symposium (GIIS)10.1109/GIIS.2016.7814941(1-8)Online publication date: Oct-2016

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '12: Proceedings of the 27th Annual ACM Symposium on Applied Computing
March 2012
2179 pages
ISBN:9781450308571
DOI:10.1145/2245276
  • Conference Chairs:
  • Sascha Ossowski,
  • Paola Lecca
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 March 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. BGP
  2. availability
  3. backup paths
  4. denial-of-service
  5. virtual private networks

Qualifiers

  • Research-article

Conference

SAC 2012
Sponsor:
SAC 2012: ACM Symposium on Applied Computing
March 26 - 30, 2012
Trento, Italy

Acceptance Rates

SAC '12 Paper Acceptance Rate 270 of 1,056 submissions, 26%;
Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)1
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2016)Improved Calculation of aS Resilience against IP Prefix Hijacking2016 IEEE 41st Conference on Local Computer Networks Workshops (LCN Workshops)10.1109/LCN.2016.037(121-128)Online publication date: Nov-2016
  • (2016)Backup paths for multiple demands in overlay networks2016 Global Information Infrastructure and Networking Symposium (GIIS)10.1109/GIIS.2016.7814941(1-8)Online publication date: Oct-2016

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media