BGP blackholing is an operational countermeasure that builds upon the capabilities of BGP to achieve DoS mitigation. Although empirical evidence of blackholing activities are documented in literature, a clear understanding of how blackholing is used in practice when attacks occur is still missing. This paper presents a first joint look at DoS attacks and BGP blackholing in the wild. We do this on the basis of two complementary data sets of DoS attacks, inferred from a large network telescope and DoS honeypots, and on a data set of blackholing events. All data sets span a period of three years, thus providing a longitudinal overview of operational deployment of blackholing during DoS attacks
Black hole or packet drop attack is a denial of service attack on routing protocols in which malicio...
The growing use of Internet service in the past few years have facilitated an increase in the denial...
The blackhole attack is one of the simplest yet effective attacks that target the AODV protocol. Bla...
BGP blackholing is an operational countermeasure that builds upon the capabilities of BGP to achieve...
BGP blackholing is a common technique used to mitigate DDoS at-tacks. Generally, the victim sends in...
Large Distributed Denial-of-Service (DDoS) attacks pose a major threat not only to end systems but a...
The Border Gateway Protocol (BGP) has been used for decades as the de facto protocol to exchange rea...
© Owner/Author 2017. This is the author's version of the work. It is posted here for your personal u...
Cybercrime is notoriously maintained and empowered by the underground economy, manifested in black m...
Prior work has demonstrated ways in which to attack the Border Gateway Protocol (BGP) system as well...
\u3cp\u3eCybercrime is notoriously maintained and empowered by the underground economy,manifested in...
Black hole or packet drop attack is a denial of service attack on routing protocols in which malicio...
© ACM 2018. This is the author's version of the work. It is posted here for your personal use. Not f...
Part 2: AdversariesInternational audienceThe BGP protocol is at the core of the routing infrastructu...
In the past years, society has become increasingly more reliant on the Internet. Consequently, the s...
Black hole or packet drop attack is a denial of service attack on routing protocols in which malicio...
The growing use of Internet service in the past few years have facilitated an increase in the denial...
The blackhole attack is one of the simplest yet effective attacks that target the AODV protocol. Bla...
BGP blackholing is an operational countermeasure that builds upon the capabilities of BGP to achieve...
BGP blackholing is a common technique used to mitigate DDoS at-tacks. Generally, the victim sends in...
Large Distributed Denial-of-Service (DDoS) attacks pose a major threat not only to end systems but a...
The Border Gateway Protocol (BGP) has been used for decades as the de facto protocol to exchange rea...
© Owner/Author 2017. This is the author's version of the work. It is posted here for your personal u...
Cybercrime is notoriously maintained and empowered by the underground economy, manifested in black m...
Prior work has demonstrated ways in which to attack the Border Gateway Protocol (BGP) system as well...
\u3cp\u3eCybercrime is notoriously maintained and empowered by the underground economy,manifested in...
Black hole or packet drop attack is a denial of service attack on routing protocols in which malicio...
© ACM 2018. This is the author's version of the work. It is posted here for your personal use. Not f...
Part 2: AdversariesInternational audienceThe BGP protocol is at the core of the routing infrastructu...
In the past years, society has become increasingly more reliant on the Internet. Consequently, the s...
Black hole or packet drop attack is a denial of service attack on routing protocols in which malicio...
The growing use of Internet service in the past few years have facilitated an increase in the denial...
The blackhole attack is one of the simplest yet effective attacks that target the AODV protocol. Bla...