scholarly journals Evaluation on the influence of internet prefix hijacking events

2013 ◽  
Vol 10 (2) ◽  
pp. 611-631 ◽  
Author(s):  
Jinjing Zhao ◽  
Yan Wen

The inter-domain routing system based on the BGP protocol is a kernel establishment in the Internet. There have been many incidents of IP prefix hijacking by BGP protocol in the Internet. Attacks may hijack victim's address space to disrupt network services or perpetrate malicious activities such as spamming and DoS attacks without disclosing identity. The relation between prefix hijacking and the Internet hierarchy is presented in this paper. The Internet is classified into three tiers based on the power-law and commercial relations of autonomous systems. The relation between network topology and prefix hijacking influence is presented for all sorts of hijacking events in different layers. The results assert that the hierarchical nature of network influences the prefix hijacking greatly.

2018 ◽  
Vol 29 (01) ◽  
pp. 1850001
Author(s):  
Zhongyan Fan ◽  
Wallace Kit-Sang Tang

The Internet is the largest artificial network consisting of billions of IP devices, managed by tens of thousands of autonomous systems (ASes). Due to its importance, the Internet has received much attention and its topological features, mainly in AS-level, have been widely explored from the complex network perspective. However, most of the previous studies assume a homogeneous model in which nodes are indistinguishable in nature. It may be good for a general study of topological structure, but unfortunately it fails to reflect the functionality. The Internet ecology is in fact heterogeneous and highly complex. It consists of various elements such as Internet Exchange Points (IXPs), Internet Content Providers (ICPs), and normal Autonomous System (ASes), realizing different roles in the Internet. In this paper, we propose level-structured network models for investigating how ICP performs under the AS-topology with power-law features and how IXP enhances its performance from a complex network perspective. Based on real data, our results reveal that the power-law nature of the Internet facilitates content delivery not only in efficiency but also in path redundancy. Moreover, the proposed multi-level framework is able to clearly illustrate the significant benefits gained by ICP from IXP peerings.


2015 ◽  
Vol 2015 ◽  
pp. 1-18 ◽  
Author(s):  
Yu Nakata ◽  
Shin’ichi Arakawa ◽  
Masayuki Murata

In the Internet, Autonomous Systems (ASes) exchange traffic through interconnected links. As traffic demand increases, more traffic becomes concentrated on such links. The traffic concentrations depend heavily on the global structure of the Internet topology. Therefore, a topological evolution considering the global structure is necessary to continually accommodate future traffic amount. In this paper, we first develop a method to identify the hierarchical nature of traffic aggregation on the Internet topology and use this method to discuss the long-term changes in traffic flow. Our basic approach is to extract the “flow hierarchy,” which is a hierarchical structure associated with traffic aggregation. Our results show that the current connection policy will lead to a severe traffic concentration in the future. We then examine a new evolution process that attempts to reduce this traffic concentration. Our proposed evolution process increases the number of links in the deeper level in the hierarchy, thus relaxing the traffic concentration. We apply our evolution process to the Internet topology in 2000 and evolve this scenario over 13 years. The results show that our evolution process could reduce the traffic concentration by more than half compared with that without our evolution process.


Author(s):  
Pratik K. Biswas ◽  
Inge Grønbæk

The evolving Internet may encounter an explosion in the number of communicating end systems, namely, smart devices and wireless sensors. Machine-to-machine services in such a network could benefit society in many areas, including environment, health care, trade, transportation, alarms and surveillance. However, such developments depend on powerful communication features with global interoperability for service ubiquity. This paper presents an architecture for the evolving Internet that decouples service logic from protocols and network elements while shielding users from underlying technologies. It also proposes an ontology-based approach for representing network interoperability as well as network services. The network ontology provides a vocabulary for uniformly describing the managed elements of the network topology under consideration, while the service ontology provides an API-based vocabulary for provisioning interoperable and ubiquitous services over the Internet. Using these ontologies, services may be replicated and deployed in diverse execution environments. The applicability of ontologies for service ubiquity is illustrated with a case-study.


2019 ◽  
Author(s):  
Abhishek Verma ◽  
Virender Ranga

<div>We have thoroughly studied the paper of Perazzo et al., which presents a routing attack named DIO suppression attack with its impact analysis. However, the considered simulation grid of size 20mx20m does not correspond to the results presented in their paper. We believe that the incorrect simulation detail needs to be rectified further for the scientific correctness of the results. In this comment, it is shown that the suppression attack on such small sized network topology does not have any major impact on routing performance, and specific reason is discussed for such behavior.</div>


2002 ◽  
Vol 7 (1) ◽  
pp. 9-25 ◽  
Author(s):  
Moses Boudourides ◽  
Gerasimos Antypas

In this paper we are presenting a simple simulation of the Internet World-Wide Web, where one observes the appearance of web pages belonging to different web sites, covering a number of different thematic topics and possessing links to other web pages. The goal of our simulation is to reproduce the form of the observed World-Wide Web and of its growth, using a small number of simple assumptions. In our simulation, existing web pages may generate new ones as follows: First, each web page is equipped with a topic concerning its contents. Second, links between web pages are established according to common topics. Next, new web pages may be randomly generated and subsequently they might be equipped with a topic and be assigned to web sites. By repeated iterations of these rules, our simulation appears to exhibit the observed structure of the World-Wide Web and, in particular, a power law type of growth. In order to visualise the network of web pages, we have followed N. Gilbert's (1997) methodology of scientometric simulation, assuming that web pages can be represented by points in the plane. Furthermore, the simulated graph is found to possess the property of small worlds, as it is the case with a large number of other complex networks.


Author(s):  
Md. Anwar Hossain ◽  
Mst. Sharmin Akter

Routing is a design way to pass the data packet. User is assigns the path in a routing configuration. A significant role played by the router for providing the dynamic routing in the network. Structure and Configuration are different for each routing protocols. Next generation internet protocol IPv6 which provides large address space, simple header format. It is mainly effective and efficient routing. It is also ensure good quality of service and also provide security. Routing protocol (OSPFv3) in IPv6 network has been studied and implemented using ‘cisco packet tracer’. ‘Ping’ the ping command is used to check the results. The small virtual network created in Cisco platform .It is also used to test the OSPFv3 protocol in the IPv6 network. This paper also contains step by step configuration and explanation in assigning of IPv6 address in routers and end devices. The receiving and sending the packet of data in a network is the responsibility of the internet protocol layer. It also contains the data analysis of packet forwarding through IPv6 on OSPFv3 in simulation mode of cisco packet virtual environment to make the decision eventually secure and faster protocol in IPv6 environment.


Author(s):  
Harol Heder García Quiceno ◽  
Vícter Alejandro García Zapata

Resumen El crecimiento de firmware en Linux, ha llegado a desarrollar varias herramientas que permitan adaptar equipos inalámbricos a las necesidades de sus compradores. Así mismo la facilidad de acceder a la documentación y soporte que se prestan en Internet con referente a estos sistemas es suficiente, para las personas que tengan poco conocimiento y deseen implementar estas herramientas. Por lo anterior se inicia con la actividad de consultar en la región, sobre implementaciones de sistemas embebidos en Linux para router inalámbricos, pero los resultados fueron negativos, Eso da paso a que surja una investigación en Internet de sistemas embebidos para Linux y por ende innovar con la instalación del DD-WRT y algunos servicios de red en un dispositivo Linksys WRT54GL. Con los pasos anteriores, de este artículo, se espera que sea el inicio para que otras personas hagan uso de estas herramientas, que no solo están en el área de las comunicaciones, sino incursionando en los hogares, y que buscan beneficios de tipo: económico, colaborativo, y una adecuada utilización recursos. Palabras ClaveLinksys, router, Linux, Firmware, Wireless, Wifi   AbstractThe growth of firmware in Linux, has come to develop several tools that enable wireless devices to adapt to the needs of their buyers. Also the ease of access to documentation and support that are provided on the internet with regards to these systems is sufficient for people who have some knowledge and want to deploy these tools.‪It starts with the previous consultation activity in the region, embedded systems implementations on Linux wireless router, but the results were negative, That leads to the emergence of a research on the Internet for Linux embedded systems and innovate with the installation of DD-WRT and some network services on a device Linksys WRT54GL.With the previous steps in this article, expected for that is the beginning for others to use these tools, which are not only in the area of communications, but making inroads into our homes, and who seek such benefits: economic, collaborative, and appropriate resource utilization It’s a text with a longitude between 60 and 300 words, that it guides the reader to identify the basic content and its relevance, because it presents in a clear and brief way the reach of the article, the main discoveries and the conclusions. Keywords Linksys, router, Linux, Firmware, Wireless, Wifi


Author(s):  
Сергей Маликов

В статье рассматривается понятие интернета вещей, очерчиваются области его применения, характеризуются основные его уязвимости: слабые пароли, использование небезопасных сетевых сервисов, уязвимый веб-интерфейс, ненадежный облачный интерфейс, ненадежный мобильный интерфейс, незащищенные патчи и обновления и др. Мақалада заттардың интернеті туралы түсінік қарастырылған, оның қолданылу аясы сипатталған, оның негізгі осалдығы сипатталады: әлсіз парольдер, қауіпті желілік қызметтерді пайдалану, осал веб-интерфейс, сенімсіз бұлт интерфейсі, сенімсіз мобильді интерфейс, қорғалмаған патчтар мен жаңартулар және т. б. The article discusses the concept of the Internet of Things, outlines its areas of application, characterizes its main vulnerabilities: weak passwords, the use of insecure network services, vulnerable web interface, unreliable cloud interface, unreliable mobile interface, unprotected patches and updates, etc.


Sign in / Sign up

Export Citation Format

Share Document