Proceedings of 2010 Cross-Strait Conference on Information Science and Technology (CSCIST 2010 E-BOOK)

Qinhuangdao,China,7.9-7.13,2010

ISBN: 978-1-935068-15-0 Scientific Research Publishing, USA

E-Book 840pp Pub. Date: July 2010

Category: Computer Science & Communications

Price: $120

Title: The Game beyond Routing Security
Source: Proceedings of 2010 Cross-Strait Conference on Information Science and Technology (CSCIST 2010 E-BOOK) (pp 745-749)
Author(s): Lei Li, School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing
Abstract: AS path forgery, e.g. prefix hijacking, has already existed in Internet for a few years. It is used to be treated as illegal ways for anonymous attackers to threaten BGP safety. In this paper, I point out that those who perform path forgery would mainly be ISPs instead of vicious attackers, because forgery could be very useful for ISPs in getting extra financial gains. Since the possible benefits and consequential behaviors are constrained by AS business relationships, they are quite different from those of normal attackers, and thus are somewhat predictable and controllable. It’s a game beyond routing security, and before the research communities draw a clear conclusion, there is much work need to be done. As the first step, I enumerate several game rules that ISPs would probably adopt and hope researchers to pay more attention to them.
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top