Resources Research

Paper Accepted

Reliable Assessment of BGP Hijacking Attacks

April 26, 2016 || Dr. Johann Schlamp

Our paper has been accepted for publication by the IEEE Journal on Selected Areas in Communications. With this work, we developed the Hijacking Event Analysis Program (HEAP), a novel approach to assess the legitimacy of BGP hijacking alarms in real-time.

Paper Accepted

Investigating the Nature of Routing Anomalies

April 17, 2015 || Dr. Johann Schlamp

Our paper has been accepted for publication by the 7th International Workshop on Traffic Monitoring and Analysis. We conducted a study on subprefix hijacking attacks in an effort to reduce false alarms commonly raised by state-of-the-art detection systems.

Paper Accepted

The Abandoned Side of the Internet

April 17, 2015 || Dr. Johann Schlamp

Our paper has been accepted for publication by the 7th International Workshop on Traffic Monitoring and Analysis. We contributed an evaluation of the the abandoned side of the Internet, in which attackers can hijack and abuse dormant networks in full anonymity.

Paper Accepted

Malicious BGP hijacks can be deceiving

February 20, 2014 || Dr. Johann Schlamp

Our paper has been accepted for publication by the IEEE International Conference on Communications. In our practical study, we show that suspicious routing events not always evidence real hijacking incidents.

Paper Accepted

A Forensic Case Study on AS Hijacking

April 29, 2013 || Dr. Johann Schlamp

Our paper has been accepted for publication by the ACM SIGCOMM Computer Communication Review. We thoroughly studied a malicious AS hijacking incident to gain unique insight into the attacker's proceeding.