Network routers occupy a unique role in modern distributed systems. They are responsible for cooperatively shuttling packets amongst themselves in order to provide the illusion of a network with universal point-to-point connectivity. However, this illusion is shattered -- as are implicit assumptions of availability, confidentiality or integrity -- when network routers act in a malicious fashion. By manipulating, diverting or dropping packets arriving at a compromised router, an attacker can trivially mount denial-of-service, surveillance or man-in-the-middle attacks on end host systems. Consequently, Internet routers have become a choice target for would-be attackers and thousands have been subverted to these ends. In this paper, we specif...
Attacks targeting network infrastructure devices pose a threat to the security of the internet. An a...
Attacks targeting network infrastructure devices pose a threat to the security of the internet. An a...
Abstract—We present the first practical example of an entirely new class of network attacks – attack...
The Internet is not a safe place. Unsecured hosts can expect to be compromised within minutes of con...
While it is widely understood that criminal miscreants are subverting large numbers of Internet-conn...
We present a solution to the denial of service prob-lem for routing infrastructures. When a network ...
1 Introduction This paper addresses part of a simple, yet increasingly important network security pr...
The TCP has provided the primary means to transfer data reliably across the Internet however TCP has...
We consider the problem of detecting whether a compromised router is maliciously manipulating its st...
We consider the problem of detecting whether a compromised router is maliciously manipulating its st...
Abstract—Security issues in computer networks have focused on attacks on end-systems and the control...
The introduction of programmability and dynamic protocol deployment in routers, there would be an in...
The introduction of programmability and dynamic protocol deployment in routers, there would be an in...
The introduction of programmability and dynamic protocol deployment in routers, there would be an in...
Security in the network remains a major challenge which is highly susceptible to maliciousness. The ...
Attacks targeting network infrastructure devices pose a threat to the security of the internet. An a...
Attacks targeting network infrastructure devices pose a threat to the security of the internet. An a...
Abstract—We present the first practical example of an entirely new class of network attacks – attack...
The Internet is not a safe place. Unsecured hosts can expect to be compromised within minutes of con...
While it is widely understood that criminal miscreants are subverting large numbers of Internet-conn...
We present a solution to the denial of service prob-lem for routing infrastructures. When a network ...
1 Introduction This paper addresses part of a simple, yet increasingly important network security pr...
The TCP has provided the primary means to transfer data reliably across the Internet however TCP has...
We consider the problem of detecting whether a compromised router is maliciously manipulating its st...
We consider the problem of detecting whether a compromised router is maliciously manipulating its st...
Abstract—Security issues in computer networks have focused on attacks on end-systems and the control...
The introduction of programmability and dynamic protocol deployment in routers, there would be an in...
The introduction of programmability and dynamic protocol deployment in routers, there would be an in...
The introduction of programmability and dynamic protocol deployment in routers, there would be an in...
Security in the network remains a major challenge which is highly susceptible to maliciousness. The ...
Attacks targeting network infrastructure devices pose a threat to the security of the internet. An a...
Attacks targeting network infrastructure devices pose a threat to the security of the internet. An a...
Abstract—We present the first practical example of an entirely new class of network attacks – attack...