Verlagslink DOI: | 10.1145/2342356.2342381 10.1145/2377677.2377702 |
Titel: | Towards Detecting BGP Route Hijacking using the RPKI | Sprache: | Englisch | Autorenschaft: | Wählisch, Matthias Maennel, Olaf Schmidt, Thomas C. |
Schlagwörter: | BGP; RPKI; secure inter-domain routing; deployment | Erscheinungsdatum: | 2012 | Verlag: | Association for Computing Machinery (ACM) | Buchtitel: | Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication | Teil der Schriftenreihe: | ACM SIGCOMM : proceedings of the ACM SIGCOMM ... conference on SIGCOMM | Zeitschrift oder Schriftenreihe: | ACM SIGCOMM computer communication review | Zeitschriftenband: | 42 | Zeitschriftenausgabe: | 4 | Anfangsseite: | 103 | Endseite: | 104 | Konferenz: | ACM SIGCOMM 2012 | Zusammenfassung: | Prefix hijacking has always been a big concern in the Internet. Some events made it into the international world-news, but most of them remain unreported or even unnoticed. The scale of the problem can only be estimated. The Resource Publication Infrastructure (RPKI) is an effort by the IETF to secure the inter-domain routing system. It includes a formally verifiable way of identifying who owns legitimately which portion of the IP address space. The RPKI has been standardized and prototype implementations are tested by Internet Service Providers (ISPs). Currently the system holds already about 2% of the Internet routing table. Therefore, in theory, it should be easy to detect hijacking of prefixes within that address space. We take an early look at BGP update data and check those updates against the RPKI in the same way a router would do, once the system goes operational. We find many interesting dynamics, not all can be easily explained as hijacking, but a significant number are likely operational testing or misconfigurations. |
URI: | http://hdl.handle.net/20.500.12738/1790 | ISBN: | 978-1-4503-1419-0 | ISSN: | 0146-4833 | Einrichtung: | Department Informatik Fakultät Technik und Informatik |
Dokumenttyp: | Konferenzveröffentlichung |
Enthalten in den Sammlungen: | Publications without full text |
Zur Langanzeige
Volltext ergänzen
Feedback zu diesem Datensatz
Export
Alle Ressourcen in diesem Repository sind urheberrechtlich geschützt.