skip to main content
10.1145/2332432.2332495acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
abstract

Brief announcement: network-destabilizing attacks

Published: 16 July 2012 Publication History

Abstract

We provide an explanation for the observed stability of today's Internet in the face of common configuration errors and attacks.

References

[1]
J. Cowie. Rensys blog: China's 18-minute mystery. http://www.renesys.com/blog/2010/11/chinas-18-minute-mystery.shtml.
[2]
S. Dolev and N. Tzachar. Empire of colonies: Self-stabilizing and self-organizing distributed algorithms. In OPODIS, pages 230--243, 2006.
[3]
L. Gao and J. Rexford. Stable Internet routing without global coordination. Trans. on Networking, 2001.
[4]
T. Griffin, F. B. Shepherd, and G. Wilfong. The stable paths problem and interdomain routing. Trans. on Networking, 2002.
[5]
N. Kushman, S. Kandula, and D. Katabi. Can you hear me now?!: it must be BGP. SIGCOMM Comput. Commun. Rev., 37:75--84, March 2007.
[6]
R. Lychev, S. Goldberg, and M. Schapira. Network destabilizing attacks. Arxiv Report 1203.1281, march 2012.
[7]
S.A. Misel. "Wow, AS7007!". Merit NANOG Archive, apr 1997. http://www.merit.edu/mail.archives/nanog/1997-04/msg00340.html.
[8]
Rensys Blog. Pakistan hijacks YouTube. http://www.renesys.com/blog/2008/02/pakistan_hijacks_youtube_1.shtml.
[9]
R. Sami, M. Schapira, and A. Zohar. Searching for stability in interdomain routing. In INFOCOM 2009, IEEE, pages 549--557, april 2009.

Cited By

View all

Index Terms

  1. Brief announcement: network-destabilizing attacks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    PODC '12: Proceedings of the 2012 ACM symposium on Principles of distributed computing
    July 2012
    410 pages
    ISBN:9781450314503
    DOI:10.1145/2332432

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 16 July 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. bgp
    2. interdomain routing
    3. security
    4. stability

    Qualifiers

    • Abstract

    Conference

    PODC '12
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 740 of 2,477 submissions, 30%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2017)I-SeismographIEEE/ACM Transactions on Networking (TON)10.1109/TNET.2017.274890225:6(3411-3426)Online publication date: 1-Dec-2017
    • (2016)Jumpstarting BGP Security with Path-End ValidationProceedings of the 2016 ACM SIGCOMM Conference10.1145/2934872.2934883(342-355)Online publication date: 22-Aug-2016
    • (2013)BGP security in partial deploymentACM SIGCOMM Computer Communication Review10.1145/2534169.248601043:4(171-182)Online publication date: 27-Aug-2013
    • (2013)BGP security in partial deploymentProceedings of the ACM SIGCOMM 2013 conference on SIGCOMM10.1145/2486001.2486010(171-182)Online publication date: 12-Aug-2013

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media