DC FieldValueLanguage
dc.contributor.authorReuter, Andreas
dc.contributor.authorBush, Randy
dc.contributor.authorCunha, Italo
dc.contributor.authorKatz-Bassett, Ethan
dc.contributor.authorSchmidt, Thomas
dc.contributor.authorWählisch, Matthias
dc.date.accessioned2020-08-26T09:20:47Z-
dc.date.available2020-08-26T09:20:47Z-
dc.date.issued2017
dc.identifier.urihttp://hdl.handle.net/20.500.12738/2060-
dc.description.abstractA proposal to improve routing security---Route Origin Authorization (ROA)---has been standardized. A ROA specifies which network is allowed to announce a set of Internet destinations. While some networks now specify ROAs, little is known about whether other networks check routes they receive against these ROAs, a process known as Route Origin Validation (ROV). Which networks blindly accept invalid routes? Which reject them outright? Which de-preference them if alternatives exist? Recent analysis attempts to use uncontrolled experiments to characterize ROV adoption by comparing valid routes and invalid routes. However, we argue that gaining a solid understanding of ROV adoption is impossible using currently available data sets and techniques. Our measurements suggest that, although some ISPs are not observed using invalid routes in uncontrolled experiments, they are actually using different routes for (non-security) traffic engineering purposes, without performing ROV. We conclude with a description of a controlled, verifiable methodology for measuring ROV and present three ASes that do implement ROV, confirmed by operators.
dc.titleTowards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering
dc.typeReport
tuhh.oai.showtrueen_US
tuhh.publication.instituteDepartment Informatik
tuhh.publication.instituteFakultät Technik und Informatik
tuhh.publisher.urlhttp://arxiv.org/abs/1706.04263
tuhh.type.opusReport-
dc.type.casraiOther-
dc.type.diniOther-
dc.type.driverother-
dcterms.DCMITypeText-
item.creatorGNDReuter, Andreas-
item.creatorGNDBush, Randy-
item.creatorGNDCunha, Italo-
item.creatorGNDKatz-Bassett, Ethan-
item.creatorGNDSchmidt, Thomas-
item.creatorGNDWählisch, Matthias-
item.fulltextNo Fulltext-
item.creatorOrcidReuter, Andreas-
item.creatorOrcidBush, Randy-
item.creatorOrcidCunha, Italo-
item.creatorOrcidKatz-Bassett, Ethan-
item.creatorOrcidSchmidt, Thomas-
item.creatorOrcidWählisch, Matthias-
item.grantfulltextnone-
item.cerifentitytypePublications-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.openairetypeReport-
crisitem.author.deptDepartment Informatik-
crisitem.author.orcid0000-0002-0956-7885-
crisitem.author.parentorgFakultät Technik und Informatik-
Appears in Collections:Publications without full text
Show simple item record

Page view(s)

82
checked on Dec 26, 2024

Google ScholarTM

Check

HAW Katalog

Check

Add Files to Item

Note about this record


Items in REPOSIT are protected by copyright, with all rights reserved, unless otherwise indicated.