Proceedings of the 2015 Internet Measurement Conference 2015
DOI: 10.1145/2815675.2815712
|View full text |Cite
|
Sign up to set email alerts
|

Investigating Interdomain Routing Policies in the Wild

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

4
66
2

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 66 publications
(72 citation statements)
references
References 22 publications
4
66
2
Order By: Relevance
“…Despite all this, accurate path prediction remains an open challenge. In a related study, we validate the accuracy of this approach and find that measured paths follow this model 65-85% of the time [10]. As a result, the numbers we observe should be taken as an estimate of the threat.…”
Section: B Improving Path-prediction Accuracysupporting
confidence: 53%
See 2 more Smart Citations
“…Despite all this, accurate path prediction remains an open challenge. In a related study, we validate the accuracy of this approach and find that measured paths follow this model 65-85% of the time [10]. As a result, the numbers we observe should be taken as an estimate of the threat.…”
Section: B Improving Path-prediction Accuracysupporting
confidence: 53%
“…In addition, we also include the possibility that some sets of ASes may collude with each other to de-anonymize Tor users. Specifically, we consider that an AS may collude with sibling ASes [10] (i.e., other ASes owned by the same organization) and ASes that may collude with each other on behalf of a state-level adversary. Finally, as part of our relay selection algorithms (Section IV), we consider a probabilistic relay selection strategy that minimizes the amount of traffic that is observable by any single attacker over a period of time.…”
Section: Adversary Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Since ASes typically are in control of the routers within an AS, it also provides some insight into the information that foreign networks could potentially gain, regardless of the location of the forwarding routers. While the accuracy of the absolute values presented still depends on the accuracy of the IP-to-AS mappings provided by the Cymru database and public IP-to-AS mappings have their shortcomings [17], [18], we note that similar mappings have successfully been used to answer many AS topology related questions [19], [20], identify complex AS relationships [21], and even interdomain routing questions [22].…”
Section: A Limitationsmentioning
confidence: 94%
“…RELATED WORK HTTPS and routing has typically been studied separately. Various traceroute-and BGP-based tools and methods have been used to understand Internet routes [22], [30]. While there are many legitimate reasons why announced AS paths (observed from BGP data) may differ from the actual data paths (observed using traceroute) [30], differences can also be used to understand interception attacks [31].…”
Section: Weak Keysmentioning
confidence: 99%