Technical Reports


Display by Author:
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Search by for:

TR-809-07
How to Take Back Your Address Space
Authors: Avramopoulos, Ioannis
Date:December 2007
Pages:6
Download Formats: [PDF]
Abstract:
Preventing adversaries from hijacking address space is important, but network operators are reluctant to deploy secure routing protocols. In this paper, we present Clout, a system that like secure routing protocols prevents prefix hijacking but, in contrast to these protocols, is easily deployable. Clout is deployable by unilateral action from a single party, or multilateral action from a moderate number of independent parties, without requiring changes to BGP or the data plane. In Clout, a collection of networks jointly defends a prefix by simultaneously announcing it in BGP, essentially hijacking the hijacker. Clout relies on the premise that the adversary can be outnumbered, a requirement attainable in practice. Deployment scenarios of Clout are also presented for emergency response and as a long-standing commercial service.