2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011) 2011
DOI: 10.1109/comsnets.2011.5716486
|View full text |Cite
|
Sign up to set email alerts
|

Impact of prefix hijacking on payments of providers

Abstract: Abstract-Whereas prefix hijacking is usually examined from security perspectives, this paper looks at it from a novel economic angle. Our study stems from an observation that a transit AS (Autonomous System) has a financial interest in attracting extra traffic to the links with its customers. Based on real data about the actual hijacking incident in the Internet, we conduct simulations in the real AS-level Internet topology with synthetic demands for the hijacked traffic. Then, we measure traffic on all inter-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 35 publications
0
6
0
Order By: Relevance
“…5 We found COVE to be scalable to very large ASes in the Internet. COVE was designed to improve a network's views of forward and reverse reachability in the Internet data plane even if COVE is partially deployed by as few as two networks connected by a link.…”
Section: Discussionmentioning
confidence: 88%
See 2 more Smart Citations
“…5 We found COVE to be scalable to very large ASes in the Internet. COVE was designed to improve a network's views of forward and reverse reachability in the Internet data plane even if COVE is partially deployed by as few as two networks connected by a link.…”
Section: Discussionmentioning
confidence: 88%
“…Once there is a set of interconnected networks that deploy COVE, there is strong incentive for another network to join and for the set to accept a new member to increase every network's views of data plane reachability. We also illustrated how network operators can use COVE to 5 Our dataset is avalable from www.cs.utexas.edu/users/lam/Internet dataset/ perform very useful network management tasks which cannot be done effectively using existing methods and tools.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Although tussles affected the Internet from its early days [22], this growing diversity together with the ubiquitous peering resulted in frequent disagreements over peering cost allocations. Traffic imbalances [23] in peering relationships led to demands of monetary compensations [2] and to a large set of techniques for minimizing costs and maximizing revenues [24]- [26]. The tensions were specially acute between networks that primarily connect residential users and those networks that connect content providers.…”
Section: Related Workmentioning
confidence: 99%
“…In contrast, our work evaluates traffic attraction by intermediary ASes that seek to increase their transit revenues. While Bangera and Gorinsky [14] simulate the YouTube prefix-hijacking incident to assess its economic implications, our investigation considers multiple attractors from different transit tiers and evaluates novel countermeasures, such as multi-stage filtering and disconnection. Goldberg et al [10], Kalogiros et al [11], and Levin et al [13] present game-theoretic investigations of economic incentives in inter-domain routing.…”
Section: N Impact On Path Lengthsmentioning
confidence: 99%