Routing Attack Vulnerability Evaluation for Networks
The Internet is a critical infrastructure that is composed of The Internet is a critical infrastructure that is composed of tens of thousands of networks and is required to work reliably 24/7. An integral functionality to achieve...
ver más
¿Tienes un proyecto y buscas un partner? Gracias a nuestro motor inteligente podemos recomendarte los mejores socios y ponerte en contacto con ellos. Te lo explicamos en este video
Proyectos interesantes
RTI2018-102112-B-I00
TECNICAS AVANZADAS DE CADENAS DE BLOQUES PARA LA INTERNET DE...
56K€
Cerrado
DATAROUTES
Mapping Internet Routes for Geopolitics
2M€
Cerrado
TIN2017-84844-C2-1-R
CRIPTOGRAFIA PARA OPTIMIZAR LA PRIVACIDAD Y LA CIBERSEGURIDA...
94K€
Cerrado
RTC-2014-2932-8
Seguridad en Dispositivos Interconectados Mediante Inyección...
196K€
Cerrado
PCIN-2016-010
FORTALECIMIENTO DE LA SEGURIDAD Y PRIVACIDAD DE LOS USUARIOS...
165K€
Cerrado
RTI2018-095499-B-C32
IOTRAIN-SEGURO: SEGURIDAD PARA EL INTERNET DE LAS COSAS EN E...
76K€
Cerrado
Información proyecto RAVEN
Duración del proyecto: 26 meses
Fecha Inicio: 2019-10-24
Fecha Fin: 2021-12-31
Descripción del proyecto
The Internet is a critical infrastructure that is composed of The Internet is a critical infrastructure that is composed of tens of thousands of networks and is required to work reliably 24/7. An integral functionality to achieve this is stable, efficient and secure routing of data traffic across several network domains. The current inter-domain routing protocol, BGP, facilitates the exchange of control-plane information (i.e., reachability of Internet resources over network paths) in a scalable and expressive manner; however, the lack of inherent security (e.g., authentication) mechanisms in its design frequently results in routing attacks. We focus on BGP prefix hijacking attacks, where a network, either due to malicious intent or because of a misconfiguration, advertises fraudulent/invalid information to the BGP routers of other networks; this information is propagated to the entire Internet, eventually leading to traffic being directed to invalid destinations (ending up dropped or intercepted and manipulated). Available proactive defenses are typically limited and inefficient. In our previous work, we have developed an advanced production-grade detection and mitigation tool that works reactively to counter these attacks. However, in practice, network operators cannot even measure how exposed their networks are to hijacking attempts, as well as their potential impact. In this project, we address exactly this need and aim to build a Proof of Concept (PoC) of a BGP hijacking vulnerability assessment service employing real-world experimentation, accurate simulations and realistic emulations. We aim to evaluate this PoC on at least two real networks, and refine its design using feedback from its future users, i.e., the network operators. We further plan to investigate key challenges towards the commercialization of such a service, namely estimating the costs for rolling out a global peering infrastructure that is needed, and defining the associated product offering.