Real-Time Security Exercises on a Realistic Interdomain Routing Experiment Platform

被引:5
作者
Li, Yue [1 ]
Liljenstam, Michael [2 ]
Liu, Jason [1 ]
机构
[1] Florida Int Univ, Sch Comp & Informat Sci, Miami, FL 33199 USA
[2] Ericsson Res, Stockholm, Sweden
来源
PADS 2009: 23RD WORKSHOP ON PRINCIPLES OF ADVANCED AND DISTRIBUTED SIMULATION, PROCEEDINGS | 2009年
基金
美国国家科学基金会;
关键词
D O I
10.1109/PADS.2009.12
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We use a realistic interdomain routing experiment platform to conduct real-time attack and defense exercises,for training purposes. Our interdomain routing experiment platform integrates open-source router software, real-time network simulation, and light-weight machine virtualization technologies, and is capable of supporting realistic large-scale touting experiments. The network model used consists of major autonomous systems connecting Swedish Internet users with realistic muting configurations derived from the routing registry. We conduct a series of real-time security exercises on this routing system to study the consequence of intentionally propagating false routing information on interdomain routing and the effectiveness of corresponding defensive measures. We describe three kinds of simplistic BGP attacks in the context of security exercises designed specifically for training purposes. While an attacker can launch attacks from a compromised router by changing its routing policies, administrators will be able to observe the adverse effect of these attacks and subsequently apply appropriate defensive measures to mitigate their impact, such as installing filtering rules. These exercises, all carried out in real time, demonstrate the feasibility of large-scale realistic routing experiments using the real-time routing experiment platform.
引用
收藏
页码:54 / +
页数:2
相关论文
共 28 条
[1]  
[Anonymous], REVEALED INTERNETS B
[2]  
Ballani H., 2007, STUDY PREFIX HIJACKI
[3]  
Barham P., 2003, Xen and the art of virtualization
[4]  
BAUER D, 2006, CASE STUDY UNDERSTAN
[5]  
BAVIER A, VINI REITAS REALISTI
[6]  
BHATIA S, 2008, GTCS0710
[7]  
Butler K., 2005, A survey of BGP security . Technical report
[8]  
CHI YJ, 2008, CYCLOPS INTERNET AS
[9]  
CONVERY S, 2003, VULNERABILITY TESTIN
[10]  
DIMITROPOULOS XA, LARGE SCALE SIMULATI