DC ElementWertSprache
dc.contributor.authorWählisch, Matthias-
dc.contributor.authorMaennel, Olaf-
dc.contributor.authorSchmidt, Thomas C.-
dc.date.accessioned2020-08-26T09:19:26Z-
dc.date.available2020-08-26T09:19:26Z-
dc.date.issued2012-
dc.identifier.isbn978-1-4503-1419-0en_US
dc.identifier.issn0146-4833en_US
dc.identifier.urihttp://hdl.handle.net/20.500.12738/1790-
dc.description.abstractPrefix hijacking has always been a big concern in the Internet. Some events made it into the international world-news, but most of them remain unreported or even unnoticed. The scale of the problem can only be estimated. The Resource Publication Infrastructure (RPKI) is an effort by the IETF to secure the inter-domain routing system. It includes a formally verifiable way of identifying who owns legitimately which portion of the IP address space. The RPKI has been standardized and prototype implementations are tested by Internet Service Providers (ISPs). Currently the system holds already about 2% of the Internet routing table. Therefore, in theory, it should be easy to detect hijacking of prefixes within that address space. We take an early look at BGP update data and check those updates against the RPKI in the same way a router would do, once the system goes operational. We find many interesting dynamics, not all can be easily explained as hijacking, but a significant number are likely operational testing or misconfigurations.en
dc.language.isoenen_US
dc.publisherAssociation for Computing Machinery (ACM)en_US
dc.relation.ispartofACM SIGCOMM computer communication reviewen_US
dc.subjectBGPen_US
dc.subjectRPKIen_US
dc.subjectsecure inter-domain routingen_US
dc.subjectdeploymenten_US
dc.subject.ddc004: Informatiken_US
dc.titleTowards Detecting BGP Route Hijacking using the RPKIen
dc.typeinProceedingsen_US
dc.relation.conferenceACM SIGCOMM 2012en_US
tuhh.container.endpage104en_US
tuhh.container.issue4en_US
tuhh.container.startpage103en_US
tuhh.container.volume42en_US
tuhh.oai.showtrueen_US
tuhh.publication.instituteDepartment Informatiken_US
tuhh.publication.instituteFakultät Technik und Informatiken_US
tuhh.publisher.doi10.1145/2342356.2342381-
tuhh.publisher.doi10.1145/2377677.2377702-
tuhh.relation.ispartofseriesACM SIGCOMM : proceedings of the ACM SIGCOMM ... conference on SIGCOMMen_US
tuhh.type.opusInProceedings (Aufsatz / Paper einer Konferenz etc.)-
dc.type.casraiConference Paper-
dc.type.dinicontributionToPeriodical-
dc.type.drivercontributionToPeriodical-
dc.type.statusinfo:eu-repo/semantics/publishedVersionen_US
dcterms.DCMITypeText-
tuhh.book.titleProceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication-
item.grantfulltextnone-
item.creatorGNDWählisch, Matthias-
item.creatorGNDMaennel, Olaf-
item.creatorGNDSchmidt, Thomas C.-
item.cerifentitytypePublications-
item.tuhhseriesidACM SIGCOMM : proceedings of the ACM SIGCOMM ... conference on SIGCOMM-
item.creatorOrcidWählisch, Matthias-
item.creatorOrcidMaennel, Olaf-
item.creatorOrcidSchmidt, Thomas C.-
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_5794-
item.fulltextNo Fulltext-
item.openairetypeinProceedings-
item.seriesrefACM SIGCOMM : proceedings of the ACM SIGCOMM ... conference on SIGCOMM-
crisitem.author.deptDepartment Informatik-
crisitem.author.orcid0000-0002-0956-7885-
crisitem.author.parentorgFakultät Technik und Informatik-
Enthalten in den Sammlungen:Publications without full text
Zur Kurzanzeige

Seitenansichten

127
checked on 03.04.2025

Google ScholarTM

Prüfe

HAW Katalog

Prüfe

Volltext ergänzen

Feedback zu diesem Datensatz


Alle Ressourcen in diesem Repository sind urheberrechtlich geschützt.