ROVER: a DNS-based method to detect and prevent IP hijacks
dc.contributor.author | Gersch, Joseph E., author | |
dc.contributor.author | Massey, Daniel, advisor | |
dc.contributor.author | Papadopoulos, Christos, committee member | |
dc.contributor.author | Strout, Michelle M., committee member | |
dc.contributor.author | Hayne, Stephen C., committee member | |
dc.date.accessioned | 2007-01-03T06:08:45Z | |
dc.date.available | 2007-01-03T06:08:45Z | |
dc.date.issued | 2013 | |
dc.description.abstract | The Border Gateway Protocol (BGP) is critical to the global internet infrastructure. Unfortunately BGP routing was designed with limited regard for security. As a result, IP route hijacking has been observed for more than 16 years. Well known incidents include a 2008 hijack of YouTube, loss of connectivity for Australia in February 2012, and an event that partially crippled Google in November 2012. Concern has been escalating as critical national infrastructure is reliant on a secure foundation for the Internet. Disruptions to military, banking, utilities, industry, and commerce can be catastrophic. In this dissertation we propose ROVER (Route Origin VERification System), a novel and practical solution for detecting and preventing origin and sub-prefix hijacks. ROVER exploits the reverse DNS for storing route origin data and provides a fail-safe, best effort approach to authentication. This approach can be used with a variety of operational models including fully dynamic in-line BGP filtering, periodically updated authenticated route filters, and real-time notifications for network operators. Our thesis is that ROVER systems can be deployed by a small number of institutions in an incremental fashion and still effectively thwart origin and sub-prefix IP hijacking despite non-participation by the majority of Autonomous System owners. We then present research results supporting this statement. We evaluate the effectiveness of ROVER using simulations on an Internet scale topology as well as with tests on real operational systems. Analyses include a study of IP hijack propagation patterns, effectiveness of various deployment models, critical mass requirements, and an examination of ROVER resilience and scalability. | |
dc.format.medium | born digital | |
dc.format.medium | doctoral dissertations | |
dc.identifier | Gersch_colostate_0053A_12039.pdf | |
dc.identifier | ETDF2013500297COMS | |
dc.identifier.uri | http://hdl.handle.net/10217/80941 | |
dc.language | English | |
dc.language.iso | eng | |
dc.publisher | Colorado State University. Libraries | |
dc.relation.ispartof | 2000-2019 | |
dc.rights | Copyright and other restrictions may apply. User is responsible for compliance with all applicable laws. For information about copyright law, please see https://libguides.colostate.edu/copyright. | |
dc.subject | security | |
dc.subject | ROVER | |
dc.subject | simulation | |
dc.subject | BGP | |
dc.subject | IP hijacking | |
dc.title | ROVER: a DNS-based method to detect and prevent IP hijacks | |
dc.type | Text | |
dcterms.rights.dpla | This Item is protected by copyright and/or related rights (https://rightsstatements.org/vocab/InC/1.0/). You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s). | |
thesis.degree.discipline | Computer Science | |
thesis.degree.grantor | Colorado State University | |
thesis.degree.level | Doctoral | |
thesis.degree.name | Doctor of Philosophy (Ph.D.) |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Gersch_colostate_0053A_12039.pdf
- Size:
- 7.45 MB
- Format:
- Adobe Portable Document Format
- Description: