11 research outputs found
Kirin: Hitting the Internet with Millions of Distributed IPv6 Announcements
The Internet is a critical resource in the day-to-day life of billions of
users. To support the growing number of users and their increasing demands,
operators have to continuously scale their network footprint -- e.g., by
joining Internet Exchange Points -- and adopt relevant technologies -- such as
IPv6. IPv6, however, has a vastly larger address space compared to its
predecessor, which allows for new kinds of attacks on the Internet routing
infrastructure. In this paper, we revisit prefix de-aggregation attacks in the
light of these two changes and introduce Kirin -- an advanced BGP prefix
de-aggregation attack that sources millions of IPv6 routes and distributes them
via thousands of sessions across various IXPs to overflow the memory of border
routers within thousands of remote ASes. Kirin's highly distributed nature
allows it to bypass traditional route-flooding defense mechanisms, such as
per-session prefix limits or route flap damping. We analyze the theoretical
feasibility of the attack by formulating it as a Integer Linear Programming
problem, test for practical hurdles by deploying the infrastructure required to
perform a small-scale Kirin attack using 4 IXPs, and validate our assumptions
via BGP data analysis, real-world measurements, and router testbed experiments.
Despite its low deployment cost, we find Kirin capable of injecting lethal
amounts of IPv6 routes in the routers of thousands of ASes
On the dynamics of interdomain routing in the Internet
The routes used in the Internet's interdomain routing system are a rich
information source that could be exploited to answer a wide range of
questions. However, analyzing routes is difficult, because the fundamental
object of study is a set of paths. In this dissertation, we present new
analysis tools -- metrics and methods -- for analyzing paths, and apply them
to study interdomain routing in the Internet over long periods of time.
Our contributions are threefold. First, we build on an existing metric (Routing
State Distance) to define a new metric that allows us to measure the similarity
between two prefixes with respect to the state of the global routing system.
Applying this metric over time yields a measure of how the set of paths to each
prefix varies at a given timescale. Second, we present PathMiner, a system to
extract large scale routing events from background noise and identify the AS
(Autonomous System) or AS-link most likely responsible for the event. PathMiner
is distinguished from previous work in its ability to identify and analyze
large-scale events that may re-occur many times over long timescales. We show
that it is scalable, being able to extract significant events from multiple
years of routing data at a daily granularity. Finally, we equip Routing State
Distance with a new set of tools for identifying and characterizing
unusually-routed ASes. At the micro level, we use our tools to identify
clusters of ASes that have the most unusual routing at each time. We also show
that analysis of individual ASes can expose business and engineering strategies
of the organizations owning the ASes. These strategies are often related to
content delivery or service replication. At the macro level, we show that the
set of ASes with the most unusual routing defines discernible and interpretable
phases of the Internet's evolution. Furthermore, we show that our tools can be
used to provide a quantitative measure of the "flattening" of the Internet
Efficient Passive Clustering and Gateways selection MANETs
Passive clustering does not employ control packets to collect topological information in ad hoc networks. In our proposal, we avoid making frequent changes in cluster architecture due to repeated election and re-election of cluster heads and gateways. Our primary objective has been to make Passive Clustering more practical by employing optimal number of gateways and reduce the number of rebroadcast packets
Cognitive Foundations for Visual Analytics
In this report, we provide an overview of scientific/technical literature on information visualization and VA. Topics discussed include an update and overview of the extensive literature search conducted for this study, the nature and purpose of the field, major research thrusts, and scientific foundations. We review methodologies for evaluating and measuring the impact of VA technologies as well as taxonomies that have been proposed for various purposes to support the VA community. A cognitive science perspective underlies each of these discussions
2009 Calendar - Postgraduate
763pp. Includes an Index of Academic Programs and an Index of Courses.Contains academic program rules and syllabuses for all University of Adelaide postgraduate programs in 2009
2007 Calendar - Postgraduate
844pp. Includes an Index of Academic Programs and an Index of Courses.Contains the academic program rules and syllabuses for all University of Adelaide postgraduate programs in 2007
2010 Calendar - Postgraduate
728pp. Includes an Index of Academic Programs and an Index of Courses.Contains academic program rules and syllabuses for all University of Adelaide postgraduate programs in 2010