2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W) 2016
DOI: 10.1109/dsn-w.2016.38
|View full text |Cite
|
Sign up to set email alerts
|

NetCo: Reliable Routing With Unreliable Routers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…Operation Aurora [5]), manipulation and modification (insertion of HTML code on webpages) and cover tunneling. A compromised routing system may be also used to bypass firewalls and intrusion prevention systems [39], violating isolation requirements in multi-tenant data centers [53], infiltrate VPNs [63] and more.…”
Section: Why It Matters?mentioning
confidence: 99%
“…Operation Aurora [5]), manipulation and modification (insertion of HTML code on webpages) and cover tunneling. A compromised routing system may be also used to bypass firewalls and intrusion prevention systems [39], violating isolation requirements in multi-tenant data centers [53], infiltrate VPNs [63] and more.…”
Section: Why It Matters?mentioning
confidence: 99%
“…The related work presented in the previous section did not take into account environments in which there are heterogeneous switches. Many organizations often build their network by combining switches with various specifications because of budget constraints and differences on the time of purchase [12]. Moreover, the processing time is also different in these switches, causing large delays when there is a heavy traffic on low-processing time switches.…”
Section: Target Problemmentioning
confidence: 99%
“…Motivated by a strong adversary, Gonzales et al [22], and Karmakar et al [40] accounted for virtual switches, and the data plane. Similarly Yu et al [97], Thimmaraju et al [90] and Feldmann et al [24] assumed a strong adversarial model, with an emphasis on hardware switches, and the defender having sufficiently large resources.…”
Section: Attacker Models For Virtual Switchesmentioning
confidence: 99%
“…Thus, implementing a firewall and/or IDS that intercepts and cleans all control communication appears feasible. Depending on the threat model, one may even opt to chain multiple IDS/firewalls or use physical appliances for such firewalling [24].…”
Section: Design Countermeasuresmentioning
confidence: 99%