TowerDefense: Deployment strategies for battling against IP prefix hijacking

  • Authors:
  • Tongqing Qiu;Lusheng Ji;Dan Pei;Jia Wang;Jun Xu

  • Affiliations:
  • College of Computing, Georgia Institute of Technology, Atlanta, USA;AT&T Labs - Research, Florham Park, NJ, USA;AT&T Labs - Research, Florham Park, NJ, USA;AT&T Labs - Research, Florham Park, NJ, USA;College of Computing, Georgia Institute of Technology, Atlanta, USA

  • Venue:
  • ICNP '10 Proceedings of the The 18th IEEE International Conference on Network Protocols
  • Year:
  • 2010

Quantified Score

Hi-index 0.01

Visualization

Abstract

IP prefix hijacking is one of the top security threats targeting today's Internet routing protocol. Several schemes have been proposed to either detect or mitigate prefix hijacking events. However, none of these approaches is adopted and deployed on a large-scale on the Internet for reasons such as scalability, economical practicality, or unrealistic assumptions about the collaborations among ISPs. Thus there are no actionable and deployable solutions for dealing with prefix hijacking. In this paper, we study key issues related to deploying and operating an IP prefix hijacking detection and mitigation system. Our contributions include (i) deployment strategies for hijacking detection and mitigation system (named as TowerDefense): a practical service model for prefix hijacking protection and effective algorithms for selecting agent locations for detecting and mitigating prefix hijacking attacks; and (ii) large scale experiments on PlanetLab and extensive analysis on the performance of TowerDefense.