Open Access System for Information Sharing

Login Library

 

Thesis
Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.author홍성철en_US
dc.date.accessioned2014-12-01T11:48:06Z-
dc.date.available2014-12-01T11:48:06Z-
dc.date.issued2012en_US
dc.identifier.otherOAK-2014-01040en_US
dc.identifier.urihttp://postech.dcollection.net/jsp/common/DcLoOrgPer.jsp?sItemId=000001221470en_US
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/1542-
dc.descriptionDoctoren_US
dc.description.abstractThe Internet is a decentralized network comprised of many interconnected networks and designed to provide communication on the basis of trust between networks. Each network communicates reachability information using Border Gateway Protocol (BGP). The Internet was designed to provide communication on the basis of trust between networks, but has proved to be a misguided assumption, due to the various types of attacks that have taken advantage of this trust. Autonomous Systems (ASes) that exchange BGP information directly with each other are assumed to be trusted, so BGP does not implement security checks to protect against receiving bad or invalid routing information from other routers, such as checking the authenticity of origin information and path attributes. As such, the Internet routing infrastructure is vulnerable to attack.IP prefix hijacking is the major threat to the security of the Internet routing system due to the lack of authoritative prefix ownership information. It is a BGP security attack, in which a BGP router, either with malicious purposes or simple due to misconfiguration, announces an IP prefix that the router does not own. This false announcement creates reachability problems and communication failures throughout the Internet. This problem has some common characteristics such as MOAS conflicts and invalid routes in BGP messages. Despite many efforts in designing IP prefix hijack detection schemes no existing design satisfies all the critical requirements of a truly effective system, that is, it must be real-time, deployable, as well as robust.In this thesis, we present a novel approach that detects IP prefix hijacking in the current Internet environment. The focus of this work is keeping the BGP routing infrastructure and not relying on mutual cooperation, to ensure ease of deployment. Also we look at fingerprinting two ASes that have the same IP prefix to distinguish IP prefix hijacking events from legitimate routing updates. This paper proposes a practical and deployable IP prefix hijacking detection algorithm with live hosts on the Internet.en_US
dc.languageengen_US
dc.publisher포항공과대학교en_US
dc.rightsBY_NC_NDen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/2.0/kren_US
dc.titleNetwork Reachability-based IP Prefix Hijacking Detectionen_US
dc.typeThesisen_US
dc.contributor.college일반대학원 컴퓨터공학과en_US
dc.date.degree2012- 2en_US
dc.type.docTypeThesis-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Views & Downloads

Browse