Repository logo
 

ROVER: a DNS-based method to detect and prevent IP hijacks

dc.contributor.authorGersch, Joseph E., author
dc.contributor.authorMassey, Daniel, advisor
dc.contributor.authorPapadopoulos, Christos, committee member
dc.contributor.authorStrout, Michelle M., committee member
dc.contributor.authorHayne, Stephen C., committee member
dc.date.accessioned2007-01-03T06:08:45Z
dc.date.available2007-01-03T06:08:45Z
dc.date.issued2013
dc.description.abstractThe Border Gateway Protocol (BGP) is critical to the global internet infrastructure. Unfortunately BGP routing was designed with limited regard for security. As a result, IP route hijacking has been observed for more than 16 years. Well known incidents include a 2008 hijack of YouTube, loss of connectivity for Australia in February 2012, and an event that partially crippled Google in November 2012. Concern has been escalating as critical national infrastructure is reliant on a secure foundation for the Internet. Disruptions to military, banking, utilities, industry, and commerce can be catastrophic. In this dissertation we propose ROVER (Route Origin VERification System), a novel and practical solution for detecting and preventing origin and sub-prefix hijacks. ROVER exploits the reverse DNS for storing route origin data and provides a fail-safe, best effort approach to authentication. This approach can be used with a variety of operational models including fully dynamic in-line BGP filtering, periodically updated authenticated route filters, and real-time notifications for network operators. Our thesis is that ROVER systems can be deployed by a small number of institutions in an incremental fashion and still effectively thwart origin and sub-prefix IP hijacking despite non-participation by the majority of Autonomous System owners. We then present research results supporting this statement. We evaluate the effectiveness of ROVER using simulations on an Internet scale topology as well as with tests on real operational systems. Analyses include a study of IP hijack propagation patterns, effectiveness of various deployment models, critical mass requirements, and an examination of ROVER resilience and scalability.
dc.format.mediumborn digital
dc.format.mediumdoctoral dissertations
dc.identifierGersch_colostate_0053A_12039.pdf
dc.identifierETDF2013500297COMS
dc.identifier.urihttp://hdl.handle.net/10217/80941
dc.languageEnglish
dc.language.isoeng
dc.publisherColorado State University. Libraries
dc.relation.ispartof2000-2019
dc.rightsCopyright and other restrictions may apply. User is responsible for compliance with all applicable laws. For information about copyright law, please see https://libguides.colostate.edu/copyright.
dc.subjectsecurity
dc.subjectROVER
dc.subjectsimulation
dc.subjectBGP
dc.subjectIP hijacking
dc.titleROVER: a DNS-based method to detect and prevent IP hijacks
dc.typeText
dcterms.rights.dplaThis Item is protected by copyright and/or related rights (https://rightsstatements.org/vocab/InC/1.0/). You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).
thesis.degree.disciplineComputer Science
thesis.degree.grantorColorado State University
thesis.degree.levelDoctoral
thesis.degree.nameDoctor of Philosophy (Ph.D.)

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Gersch_colostate_0053A_12039.pdf
Size:
7.45 MB
Format:
Adobe Portable Document Format
Description: