Matches in SemOpenAlex for { <https://semopenalex.org/work/W2925381967> ?p ?o ?g. }
- W2925381967 abstract "Large botnet-based flooding attacks have recently demonstrated unprecedented damage. However, the best-known end-to-end availability guarantees against flooding attacks require costly global-scale coordination among autonomous systems (ASes). A recent proposal called routing around congestion (or RAC) attempts to offer strong end-to-end availability to a selected critical flow by dynamically rerouting it to an uncongested detour path without requiring any inter-AS coordination. This paper presents an in-depth analysis of the (in)feasibility of the RAC defense and points out that its rerouting approach, though intriguing, cannot possibly solve the challenging flooding problem. An effective RAC solution should find an inter-domain detour path for its critical flow with the two following desired properties: (1) it guarantees the establishment of an arbitrary detour path of its choice, and (2) it isolates the established detour path from non-critical flows so that the path is used exclusively for its critical flow. However, we show a fundamental trade-off between the two desired properties, and as a result, only one of them can be achieved but not both. Worse yet, we show that failing to achieve either of the two properties makes the RAC defense not just ineffective but nearly unusable. When the newly established detour path is not isolated, a new adaptive adversary can detect it in real time and immediately congest the path, defeating the goals of the RAC defense. Conversely, when the establishment of an arbitrary detour path is not guaranteed, more than 80% of critical flows we test have only a small number (e.g., three or less) of detour paths that can actually be established and disjoint from each other, which significantly restricts the available options for the reliable RAC operation. The first lesson of this study is that BGP-based rerouting solutions in the current inter-domain infrastructure seem to be impractical due to implicit assumptions (e.g., the invisibility of poisoning messages) that are unattainable in BGP's current practice. Second, we learn that the analysis of protocol specifications alone is insufficient for the feasibility study of any new defense proposal and, thus, additional rigorous security analysis and various network evaluations, including real-world testing, are required. Finally, our findings in this paper agree well with the conclusion of the major literature about end-to-end guarantees; that is, strong end-to-end availability should be a security feature of the Internet routing by design, not an ad hoc feature obtained via exploiting current routing protocols." @default.
- W2925381967 created "2019-04-11" @default.
- W2925381967 creator A5026789384 @default.
- W2925381967 creator A5031599880 @default.
- W2925381967 creator A5063913067 @default.
- W2925381967 creator A5071398441 @default.
- W2925381967 creator A5081770216 @default.
- W2925381967 creator A5082521029 @default.
- W2925381967 date "2019-05-01" @default.
- W2925381967 modified "2023-10-17" @default.
- W2925381967 title "On the Feasibility of Rerouting-Based DDoS Defenses" @default.
- W2925381967 cites W1545869203 @default.
- W2925381967 cites W1667779031 @default.
- W2925381967 cites W2008620264 @default.
- W2925381967 cites W2015508120 @default.
- W2925381967 cites W2030650827 @default.
- W2925381967 cites W2033637032 @default.
- W2925381967 cites W2038055456 @default.
- W2925381967 cites W2078195751 @default.
- W2925381967 cites W2104692292 @default.
- W2925381967 cites W2117226155 @default.
- W2925381967 cites W2118878434 @default.
- W2925381967 cites W2119101903 @default.
- W2925381967 cites W2124849736 @default.
- W2925381967 cites W2154178154 @default.
- W2925381967 cites W2162969618 @default.
- W2925381967 cites W2207058899 @default.
- W2925381967 cites W2287088142 @default.
- W2925381967 cites W2290078480 @default.
- W2925381967 cites W2398484943 @default.
- W2925381967 cites W2535001381 @default.
- W2925381967 cites W2573541888 @default.
- W2925381967 cites W2789780249 @default.
- W2925381967 cites W2794568842 @default.
- W2925381967 cites W4233121833 @default.
- W2925381967 doi "https://doi.org/10.1109/sp.2019.00055" @default.
- W2925381967 hasPublicationYear "2019" @default.
- W2925381967 type Work @default.
- W2925381967 sameAs 2925381967 @default.
- W2925381967 citedByCount "23" @default.
- W2925381967 countsByYear W29253819672018 @default.
- W2925381967 countsByYear W29253819672019 @default.
- W2925381967 countsByYear W29253819672020 @default.
- W2925381967 countsByYear W29253819672021 @default.
- W2925381967 countsByYear W29253819672022 @default.
- W2925381967 countsByYear W29253819672023 @default.
- W2925381967 crossrefType "proceedings-article" @default.
- W2925381967 hasAuthorship W2925381967A5026789384 @default.
- W2925381967 hasAuthorship W2925381967A5031599880 @default.
- W2925381967 hasAuthorship W2925381967A5063913067 @default.
- W2925381967 hasAuthorship W2925381967A5071398441 @default.
- W2925381967 hasAuthorship W2925381967A5081770216 @default.
- W2925381967 hasAuthorship W2925381967A5082521029 @default.
- W2925381967 hasBestOaLocation W29253819671 @default.
- W2925381967 hasConcept C110875604 @default.
- W2925381967 hasConcept C120314980 @default.
- W2925381967 hasConcept C136764020 @default.
- W2925381967 hasConcept C15744967 @default.
- W2925381967 hasConcept C186594467 @default.
- W2925381967 hasConcept C22735295 @default.
- W2925381967 hasConcept C2524010 @default.
- W2925381967 hasConcept C2777735758 @default.
- W2925381967 hasConcept C31258907 @default.
- W2925381967 hasConcept C33923547 @default.
- W2925381967 hasConcept C38349280 @default.
- W2925381967 hasConcept C38652104 @default.
- W2925381967 hasConcept C38822068 @default.
- W2925381967 hasConcept C41008148 @default.
- W2925381967 hasConcept C41065033 @default.
- W2925381967 hasConcept C542102704 @default.
- W2925381967 hasConcept C74172769 @default.
- W2925381967 hasConceptScore W2925381967C110875604 @default.
- W2925381967 hasConceptScore W2925381967C120314980 @default.
- W2925381967 hasConceptScore W2925381967C136764020 @default.
- W2925381967 hasConceptScore W2925381967C15744967 @default.
- W2925381967 hasConceptScore W2925381967C186594467 @default.
- W2925381967 hasConceptScore W2925381967C22735295 @default.
- W2925381967 hasConceptScore W2925381967C2524010 @default.
- W2925381967 hasConceptScore W2925381967C2777735758 @default.
- W2925381967 hasConceptScore W2925381967C31258907 @default.
- W2925381967 hasConceptScore W2925381967C33923547 @default.
- W2925381967 hasConceptScore W2925381967C38349280 @default.
- W2925381967 hasConceptScore W2925381967C38652104 @default.
- W2925381967 hasConceptScore W2925381967C38822068 @default.
- W2925381967 hasConceptScore W2925381967C41008148 @default.
- W2925381967 hasConceptScore W2925381967C41065033 @default.
- W2925381967 hasConceptScore W2925381967C542102704 @default.
- W2925381967 hasConceptScore W2925381967C74172769 @default.
- W2925381967 hasLocation W29253819671 @default.
- W2925381967 hasOpenAccess W2925381967 @default.
- W2925381967 hasPrimaryLocation W29253819671 @default.
- W2925381967 hasRelatedWork W2039442723 @default.
- W2925381967 hasRelatedWork W2124456408 @default.
- W2925381967 hasRelatedWork W2258515346 @default.
- W2925381967 hasRelatedWork W2419539551 @default.
- W2925381967 hasRelatedWork W2560748881 @default.
- W2925381967 hasRelatedWork W2807354431 @default.
- W2925381967 hasRelatedWork W2921012173 @default.
- W2925381967 hasRelatedWork W3163710541 @default.
- W2925381967 hasRelatedWork W3212591162 @default.