A combined solution for the Internet access denial caused by malicious Internet service providers
نویسنده
چکیده
The Internet is becoming a vital communication tool for individuals, businesses, and governments. Thus, the Internet access reliability is crucial especially against malicious behaviors. When a malicious higher-tier Internet service provider filters transit traffic for the purpose of dropping a specific network’s packets, then an Internet access denial occurs. This paper presents a solution for the denial of the Internet access problem that combines a network address translation based solution with a tunnel-based solution. The network address translation based solution is efficient in terms of network performance but suffers from a server reachability problem; a problem that is solved by using a tunnel-based solution. Moreover, the paper evaluates the combined solution performance with respect to the end-to-end delay and the throughput metrics. The combined solution has insignificant effect on these two metrics when traffic originates from the denied network and is forwarded outside the denied network. In contrast, and dependent on the tunneling protocol used, the combined solution increases the end-to-end delay of the network by at least 6% and decreases the throughput of the traffic by at least 1.65% when the traffic is originated outside the denied network and is intended for servers inside the denied network. Copyright © 2013 John Wiley & Sons, Ltd.
منابع مشابه
A scalable NAT-based solution to Internet access denial by higher-tier ISPs
The Internet is an interconnection of autonomous systems (ASes) that are mostly controlled by Internet service providers (ISPs). ASes use Border Gateway Protocol (BGP) to communicate routing information in the form of reachability paths. However, BGP does not guarantee that the advertised reachability paths will be exactly followed. As a result, traffic belonging to a specific network can be in...
متن کاملA Novel Trust Management Model in the Social Internet of Things
The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. There may be misbehaving owners and consequently misbehaving devices that can perform harmf...
متن کاملin ISP Networks
This document contains recommendations on how Internet Service Providers can use various remediation techniques to manage the effects of malicious bot infestations on computers used by their subscribers. Internet users with infected computers are exposed to risks such as loss of personal data and increased susceptibility to online fraud. Such computers can also become inadvertent participants i...
متن کاملRouter Based Mechanism for Mitigation of DDoS Attack- A Survey
Today most of the activities like trade, e-commerce are dependent on the availability of Internet. The growing use of internet services in the past few years have facilitated increase in distributed denial of service attack. Due to DDos attacks, caused by malicious hosts secured data communication over the internet is very difficult to achieve and is the need of the hour. DDos attacks are one o...
متن کاملPerformance of Voip Services on a Docsis Network Targeted by a Denial of Service Attack
Over 48 million end users worldwide utilize cable modems as their means of accessing the Internet at high speeds. Networks which provide access via cable modems utilize Data Over Cable Service Interface Specifications (DOCSIS) as their means of network management. As availability and utilization to the Internet increases (especially at high speeds supported by broadband access), so does the opp...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Security and Communication Networks
دوره 7 شماره
صفحات -
تاریخ انتشار 2014