2016
DOI: 10.1007/978-3-319-30505-9_24
|View full text |Cite
|
Sign up to set email alerts
|

Blackholing at IXPs: On the Effectiveness of DDoS Mitigation in the Wild

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

6
38
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
2

Relationship

3
6

Authors

Journals

citations
Cited by 50 publications
(50 citation statements)
references
References 19 publications
6
38
1
Order By: Relevance
“…Figure 4 plots the fraction of all covered BGP announcements that were invalid that we observed during our measurement period. However, according to the recommended best practices for network operators, BGP routes for prefixes more specific than /24 are not usually accepted to prevent routing table deaggregation [19,31]. Thus, to obtain the effective BGP announcements that will end up in BGP tables, we also plot the same graph and filter out the BGP announcements more specific than /24 in the bottom plot.…”
Section: Invalid Announcementsmentioning
confidence: 99%
“…Figure 4 plots the fraction of all covered BGP announcements that were invalid that we observed during our measurement period. However, according to the recommended best practices for network operators, BGP routes for prefixes more specific than /24 are not usually accepted to prevent routing table deaggregation [19,31]. Thus, to obtain the effective BGP announcements that will end up in BGP tables, we also plot the same graph and filter out the BGP announcements more specific than /24 in the bottom plot.…”
Section: Invalid Announcementsmentioning
confidence: 99%
“…Giotsas et al [11] present a comprehensive characterization of BGP blackholing activity, based on BGP data. Dietzel et al [24] and Chatzis et al [25] emphasize that IXPs play a key role in deploying blackholing. Our contribution focuses instead on correlating DoS attacks and blackholing events.…”
Section: Related Workmentioning
confidence: 99%
“…Second, inbound policies must be installed in every edge switch because the computation of a packet's egress point occurs when the packet first enters the IXP network. Finally, members' blackholing [23] policies are replicated at those IXP ingress switches where the targeted malicious traffic is expected to enter the fabric. However, given the current nature of DDoS (Distributed Denial of Service) attacks where multiple sources target a single destination, blackholing policies can be aggregated and installed at the IXP egress switches only, thus trading lower forwarding state space for higher IXP fabric bandwidth overhead.…”
Section: A Scaling the Forwarding Statementioning
confidence: 99%
“…To evaluate the blackholing capabilities of the ENDEAV-OUR platform, we record the BGP blackholing updates at a large European IXP [23] over the course of one day. These announcements and withdrawals are then replayed by using the ENDEAVOUR blackholing API.…”
Section: Blackholingmentioning
confidence: 99%