Resources Research
Paper Accepted
Reliable Assessment of BGP Hijacking Attacks
Our paper has been accepted for publication by the IEEE Journal on Selected Areas in Communications. With this work, we developed the Hijacking Event Analysis Program (HEAP), a novel approach to assess the legitimacy of BGP hijacking alarms in real-time.
Paper Accepted
Investigating the Nature of Routing Anomalies
Our paper has been accepted for publication by the 7th International Workshop on Traffic Monitoring and Analysis. We conducted a study on subprefix hijacking attacks in an effort to reduce false alarms commonly raised by state-of-the-art detection systems.
Paper Accepted
The Abandoned Side of the Internet
Our paper has been accepted for publication by the 7th International Workshop on Traffic Monitoring and Analysis. We contributed an evaluation of the the abandoned side of the Internet, in which attackers can hijack and abuse dormant networks in full anonymity.
Paper Accepted
Malicious BGP hijacks can be deceiving
Our paper has been accepted for publication by the IEEE International Conference on Communications. In our practical study, we show that suspicious routing events not always evidence real hijacking incidents.
Paper Accepted
A Forensic Case Study on AS Hijacking
Our paper has been accepted for publication by the ACM SIGCOMM Computer Communication Review. We thoroughly studied a malicious AS hijacking incident to gain unique insight into the attacker's proceeding.