A study of IP prefix hijacking in cloud computing networks

作者: Yujing Liu , Wei Peng , Jinshu Su

DOI: 10.1002/SEC.738

关键词:

摘要: IP prefix hijacking remains a serious security threat to the traditional services in Internet. It also harms confidentiality and integrity of user data Internet-enabled cloud because its great dependence on Internet routing infrastructure. In addition, collaborations between networks environment, especially cross-domain deployment, bring about new types attack, which may cause greater impact due side-effect cooperation victim infected autonomous systems. is important understand what attack can how number locations participants affect attacking results. this paper, we model problem as an planning task solve it by applying genetic algorithm. By analyzing best solution problem, find that type victims plays more role than attackers. Attackers gain even when prefixes small are hijacked. For planning, degree system major criterion be considered. These findings useful for securing computing preventing eliminating attacks. Copyright © 2013 John Wiley & Sons, Ltd.

参考文章(13)
Mohit Lad, Dan Pei, Lixia Zhang, Dan Massey, Yiguo Wu, Beichuan Zhang, PHAS: a prefix hijack alert system usenix security symposium. pp. 11- ,(2006)
Mark Lee Badger, Timothy Grance, Robert Patt-Corner, Jeffery M Voas, Cloud Computing Synopsis and Recommendations ,(2012)
Anirudh Ramachandran, Nick Feamster, Understanding the network-level behavior of spammers acm special interest group on data communication. ,vol. 36, pp. 291- 302 ,(2006) , 10.1145/1151659.1159947
Zheng Zhang, Ying Zhang, Y. Charlie Hu, Z. Morley Mao, Randy Bush, Ispy ACM SIGCOMM Computer Communication Review. ,vol. 38, pp. 327- 338 ,(2008) , 10.1145/1402946.1402996
Hitesh Ballani, Paul Francis, Xinyang Zhang, A study of prefix hijacking and interception in the internet acm special interest group on data communication. ,vol. 37, pp. 265- 276 ,(2007) , 10.1145/1282380.1282411
Mohit Lad, Ricardo Oliveira, Beichuan Zhang, Lixia Zhang, Understanding Resiliency of Internet Topology against Prefix Hijack Attacks dependable systems and networks. pp. 368- 377 ,(2007) , 10.1109/DSN.2007.95
Sharon Goldberg, Michael Schapira, Peter Hummon, Jennifer Rexford, How secure are secure interdomain routing protocols Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM - SIGCOMM '10. ,vol. 40, pp. 87- 98 ,(2010) , 10.1145/1851182.1851195
Xiaoliang Zhao, Dan Pei, Lan Wang, Dan Massey, Allison Mankin, S. Felix Wu, Lixia Zhang, An analysis of BGP multiple origin AS (MOAS) conflicts Proceedings of the First ACM SIGCOMM Workshop on Internet Measurement - IMW '01. pp. 31- 35 ,(2001) , 10.1145/505202.505207
Lixin Gao, On inferring autonomous system relationships in the internet IEEE ACM Transactions on Networking. ,vol. 9, pp. 733- 745 ,(2001) , 10.1109/90.974527
Ola Nordström, Constantinos Dovrolis, Beware of BGP attacks acm special interest group on data communication. ,vol. 34, pp. 1- 8 ,(2004) , 10.1145/997150.997152