A measurement study of persistent forwarding loops on the Internet

نویسندگان

  • Jianhong Xia
  • Lixin Gao
  • Teng Fei
چکیده

In this paper, we present a measurement study of persistent forwarding loops and a flooding attack that exploits persistent forwarding loops. Persistent forwarding loops may share one or more links with forwarding paths to some hosts. An attacker can exploit persistent forwarding loops to overload the shared links and disrupt Internet connectivity to those hosts. To understand the extent of this vulnerability, we perform extensive measurements to systematically study persistent forwarding loops. We find that persistent forwarding loops do exist in the Internet. At least 35 million addresses experience persistent forwarding loops, and at least 11 million addresses can be attacked by exploiting such persistent forwarding loops. In addition, 87.4% of persistent forwarding loops involve routers in destination domains, which can be observed from various locations. This makes it possible to launch attacks from multiple vantage points. We also find that most persistent forwarding loops are just two hops long, which enables an attacker to significantly amplify traffic to them. We further investigate the possible cause of persistent forwarding loops, and find that about 50% of them are caused by neglecting to configure pull-up routes. We show that even if the misconfiguration occurs in a stub network, it may cause persistent forwarding loops involving routers in large ISPs, and can potentially be exploited by attackers to flood links in a backbone network. To the best of our knowledge, this is the first study of exploiting routing misconfigurations to launch DDoS attacks and understanding the impact of such attacks. 2007 Elsevier B.V. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Preventing persistent oscillations and loops in IBGP configuration with route reflection

Internal Border Gateway Protocol (IBGP) is responsible for distributing external reachability information, obtained via External-BGP (EBGP) sessions, within an autonomous system (AS). To avoid a full mesh of IBGP sessions between all the BGP speakers of an AS, scaling schemes such as route reflection and AS confederations have been proposed. But it has been observed that employing these schemes...

متن کامل

A Consistency Management Layer for Inter-Domain Routing

This paper proposes an isolation layer – a shim – between inter-domain routing and packet forwarding. The job of this layer is to coordinate between Autonomous Systems (AS’s) on when and how to modify the forwarding state to ensure interdomain routing loops do not cause forwarding loops. The benefits of a consistency layer are twofold. First, it prevents the creation of transient inter-domain f...

متن کامل

Persistent sub-diaphragmatic activity on the myocardial perfusion scan with 99mTc-Sestamibi

We present a female patient with atypical chest pain who was referred to our department for ischemia evaluation. 99mTc-MIBI myocardial perfusion scan with dipyridamole stress was performed. Sub-diaphragmatic activity in the hepatic tissue and then in the bowel loops caused severe overlap on the inferior wall even on consecutive delayed images. Dipyridamole stress was repeated for the...

متن کامل

RFC 5302 Domain - wide Prefix Distribution

This document describes extensions to the Intermediate System to Intermediate System (IS-IS) protocol to support optimal routing within a two-level domain. The IS-IS protocol is specified in ISO 10589, with extensions for supporting IPv4 (Internet Protocol) specified in RFC 1195. This document replaces RFC 2966. This document extends the semantics presented in RFC 1195 so that a routing domain ...

متن کامل

Direct Marketing Based on Fuzzy Clustering of Customers (Case Study: on one Mobile Company)

Objective There is a general tendency toward direct marketing these days. Therefore, instead of designing advertisement and marketing strategies for all the customers in the market, it is recommended to classify the customers based on clustering techniques and then design specific strategies accordingly. This will reduce marketing and advertisement expenses, increase sale department efficientl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Networks

دوره 51  شماره 

صفحات  -

تاریخ انتشار 2007