Practicable route leak detection and protection with ASIRIA
نویسندگان
چکیده
Route leak events have historically caused many wide-scale disruptions on the Internet. Leaks are particularly hard to detect because they most frequently involve routes with legitimate origin announced through paths that propagated beyond their scope. In this paper we present ASIRIA, a mechanism for detecting and avoiding leaked protecting against leakage uses AS relationship information inferred from Internet Routing Registries. By relying existing information, ASIRIA provides immediate benefits early adopters. particular, consider deployment of leaks by over 300 ASes show it can 99% generated customer or peer solely using currently available in 90% cases.
منابع مشابه
Practicable Safety: Train Protection System Evaluation
Standards relating to the development of safetyrelated systems containing software tend to focus on the requirements that need to be met in order to ensure that a system of the expected integrity is delivered. These standards are establishing benchmarks which customers and regulators are now specifying. The problem is that if a high integrity system is required, it may be uneconomic because of ...
متن کاملLeak detection
This paper will give an introduction to the leak detection of vacuum systems. Various methods to detect leaks as well as the most widely used helium leak detectors and their different applications are presented. Practical examples in the context of accelerator vacuum systems will illustrate the topic.
متن کاملModel Based Pipeline Monitoring with Leak Detection
We design a leak detection system consisting of an adaptive Luenbergertype observer based on a set of two coupled one dimensional first order nonlinear hyperbolic partial differential equations governing the flow dynamics. It is assumed that measurements are only available at the inlet and outlet of the pipe, and output injection is applied in the form of boundary conditions. Heuristic update l...
متن کاملPipeline Leak Detection Techniques
Leak detection systems range from simple, visual line walking and checking ones to complex arrangements of hard-ware and software. No one method is universally applicable and operating requirements dictate which method is the most cost effective. The aim of the paper is to review the basic techniques of leak detection that are currently in use. The advantages and disadvantages of each method ar...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Networks
سال: 2022
ISSN: ['1872-7069', '1389-1286']
DOI: https://doi.org/10.1016/j.comnet.2022.108966