DC ElementWertSprache
dc.contributor.authorReuter, Andreas-
dc.contributor.authorBush, Randy-
dc.contributor.authorCunha, Italo-
dc.contributor.authorKatz-Bassett, Ethan-
dc.contributor.authorSchmidt, Thomas-
dc.contributor.authorWählisch, Matthias-
dc.date.accessioned2020-08-26T12:20:35Z-
dc.date.available2020-08-26T12:20:35Z-
dc.date.issued2018-04-27-
dc.identifier.issn0146-4833en_US
dc.identifier.urihttp://hdl.handle.net/20.500.12738/4069-
dc.description.abstractA proposal to improve routing security---Route Origin Authorization (ROA)---has been standardized. A ROA specifies which network is allowed to announce a set of Internet destinations. While some networks now specify ROAs, little is known about whether other networks check routes they receive against these ROAs, a process known as Route Origin Validation (ROV). Which networks blindly accept invalid routes? Which reject them outright? Which de-preference them if alternatives exist? Recent analysis attempts to use uncontrolled experiments to characterize ROV adoption by comparing valid routes and invalid routes. However, we argue that gaining a solid understanding of ROV adoption is impossible using currently available data sets and techniques. Our measurements suggest that, although some ISPs are not observed using invalid routes in uncontrolled experiments, they are actually using different routes for (non-security) traffic engineering purposes, without performing ROV. We conclude with a description of a controlled, verifiable methodology for measuring ROV and present three ASes that do implement ROV, confirmed by operators.en
dc.language.isoenen_US
dc.publisherACM SIGCOMMen_US
dc.relation.ispartofACM SIGCOMM computer communication reviewen_US
dc.subjectBGPen_US
dc.subjectRPKIen_US
dc.subjectrouting policiesen_US
dc.subjectInternet securityen_US
dc.subject.ddc004: Informatiken_US
dc.titleTowards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filteringen
dc.typeArticleen_US
dc.description.versionPeerRevieweden_US
tuhh.container.endpage27en_US
tuhh.container.issue1en_US
tuhh.container.startpage19en_US
tuhh.container.volume48en_US
tuhh.oai.showtrueen_US
tuhh.publication.instituteDepartment Informatiken_US
tuhh.publication.instituteFakultät Technik und Informatiken_US
tuhh.publisher.doi10.1145/3211852.3211856-
tuhh.type.opus(wissenschaftlicher) Artikel-
dc.type.casraiJournal Article-
dc.type.diniarticle-
dc.type.driverarticle-
dc.type.statusinfo:eu-repo/semantics/publishedVersionen_US
dcterms.DCMITypeText-
item.languageiso639-1en-
item.fulltextNo Fulltext-
item.creatorGNDReuter, Andreas-
item.creatorGNDBush, Randy-
item.creatorGNDCunha, Italo-
item.creatorGNDKatz-Bassett, Ethan-
item.creatorGNDSchmidt, Thomas-
item.creatorGNDWählisch, Matthias-
item.openairetypeArticle-
item.grantfulltextnone-
item.creatorOrcidReuter, Andreas-
item.creatorOrcidBush, Randy-
item.creatorOrcidCunha, Italo-
item.creatorOrcidKatz-Bassett, Ethan-
item.creatorOrcidSchmidt, Thomas-
item.creatorOrcidWählisch, Matthias-
item.cerifentitytypePublications-
item.openairecristypehttp://purl.org/coar/resource_type/c_6501-
crisitem.author.deptDepartment Informatik-
crisitem.author.orcid0000-0002-0956-7885-
crisitem.author.parentorgFakultät Technik und Informatik-
Enthalten in den Sammlungen:Publications without full text
Zur Kurzanzeige

Seitenansichten

40
checked on 14.01.2025

Google ScholarTM

Prüfe

HAW Katalog

Prüfe

Volltext ergänzen

Feedback zu diesem Datensatz


Alle Ressourcen in diesem Repository sind urheberrechtlich geschützt.