Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures

作者: Min Suk Kang , Virgil D. Gligor

DOI: 10.1145/2660267.2660299

关键词: Vulnerability (computing)Routing (electronic design automation)Key (cryptography)Computer scienceInternet hosting serviceComputer securityComputer networkDenial-of-service attackThe InternetHost (network)Exploit

摘要: How pervasive is the vulnerability to link-flooding attacks that degrade connectivity of thousands Internet hosts? Are some geographic regions more vulnerable than others? Do practical countermeasures exist? To answer these questions, we introduce notion routing bottlenecks and show it a fundamental property design; i.e., consequence route-cost minimizations. We illustrate pervasiveness in an experiment comprising 15 countries cities distributed around world, measure their susceptibility scalable attacks. present key characteristics bottlenecks, including size, link type, distance from host destinations, suggest specific structural operational These can be deployed by network operators without needing major redesign.

参考文章(53)
Dorit S. Hochbaum, Approximating covering and packing problems: set cover, vertex cover, independent set, and related problems Approximation algorithms for NP-hard problems. pp. 94- 143 ,(1996)
Patrick Verkaik, Dan Pei, Jacobus E. van der Merwe, Alex C. Snoeren, Aman Shaikh, Tom Scholl, Wresting control from BGP: scalable fine-grained route control usenix annual technical conference. pp. 23- ,(2007)
Walter Willinger, David Alderson, John C. Doyle, Mathematics and the Internet: A Source of Enormous Confusion and Great Potential American Mathematical Society. ,(2009)
Ahren Studer, Adrian Perrig, The Coremelt attack european symposium on research in computer security. pp. 37- 52 ,(2009) , 10.1007/978-3-642-04444-1_3
Ratul Mahajan, Neil Spring, David Wetherall, Tom Anderson, Inferring link weights using end-to-end measurements acm special interest group on data communication. pp. 231- 236 ,(2002) , 10.1145/637201.637237
Michalis Faloutsos, Petros Faloutsos, Christos Faloutsos, On power-law relationships of the Internet topology acm special interest group on data communication. ,vol. 29, pp. 251- 262 ,(1999) , 10.1145/316188.316229
Erik Nygren, Ramesh K. Sitaraman, Jennifer Sun, The Akamai network: a platform for high-performance internet applications Operating Systems Review. ,vol. 44, pp. 2- 19 ,(2010) , 10.1145/1842733.1842736
Pietro Marchetta, Valerio Persico, Antonio Pescapè, Pythia: yet another active probing technique for alias resolution conference on emerging network experiment and technology. pp. 229- 234 ,(2013) , 10.1145/2535372.2535413
Aaron Clauset, Cosma Rohilla Shalizi, M. E. J. Newman, Power-Law Distributions in Empirical Data Siam Review. ,vol. 51, pp. 661- 703 ,(2009) , 10.1137/070710111
Phillipa Gill, Michael Schapira, Sharon Goldberg, A survey of interdomain routing policies acm special interest group on data communication. ,vol. 44, pp. 28- 34 ,(2013) , 10.1145/2567561.2567566