{"@context":"http://iiif.io/api/presentation/2/context.json","@id":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/manifest.json","@type":"sc:Manifest","label":"Measuring Routing Policies on the Internet","metadata":[{"label":"dc.description.sponsorship","value":"This work is sponsored by the Stony Brook University Graduate School in compliance with the requirements for completion of degree."},{"label":"dc.format","value":"Monograph"},{"label":"dc.format.medium","value":"Electronic Resource"},{"label":"dc.identifier.uri","value":"http://hdl.handle.net/11401/77302"},{"label":"dc.language.iso","value":"en_US"},{"label":"dc.publisher","value":"The Graduate School, Stony Brook University: Stony Brook, NY."},{"label":"dcterms.abstract","value":"Models of Internet routing are critical for studies of Internet security, reliability and evolution, which often rely on simulations of the Internet\u00e2\u20ac\u2122s routing system. Accurate models are difficult to build and suffer from a dearth of ground truth data, as ISPs often treat their connectivity and routing policies as trade secrets. In this environment, researchers rely on a number of simplifying assumptions and models proposed over a decade ago, which are widely criticized for their inability to capture routing policies employed in practice. This thesis makes the following two contributions: Investigating Interdomain Routing Policies. First we put Internet topologies and models under the microscope to understand where they fail to capture real routing behavior. We measure data plane paths from thousands of vantage points, located in eyeball networks around the globe, and find that between 14-35% of routing decisions are not explained by existing models. We then investigate these cases, and identify root causes such as selective prefix announcement, misclassification of undersea cables, and geographic constraints. Our work highlights the need for models that address such cases, and motivates the need for further investigation of evolving Internet connectivity. Study of attacks against Decoy router deployments. Second, we use our understanding of routing over the Internet and tools developed to study the effect of decoy router deployments over the Internet and come up with a way to figure out an optimal decoy router deployment, given a target AS. We introduce the notion of Helper ASes, which are autonomous systems that do not host a decoy router in their network but help out by performing targeted poisonings in their announcements in order to try and force traffic coming in from censoring countries through an AS hosting a decoy router. This allows us to greatly reduces the number of deployments required for the system to be effective."},{"label":"dcterms.available","value":"2017-09-20T16:52:23Z"},{"label":"dcterms.contributor","value":"Balasubramanian, Aruna"},{"label":"dcterms.creator","value":"Niaz, Mohammad Haseeb"},{"label":"dcterms.dateAccepted","value":"2017-09-20T16:52:23Z"},{"label":"dcterms.dateSubmitted","value":"2017-09-20T16:52:23Z"},{"label":"dcterms.description","value":"Department of Computer Science."},{"label":"dcterms.extent","value":"59 pg."},{"label":"dcterms.format","value":"Monograph"},{"label":"dcterms.identifier","value":"http://hdl.handle.net/11401/77302"},{"label":"dcterms.issued","value":"2015-12-01"},{"label":"dcterms.language","value":"en_US"},{"label":"dcterms.provenance","value":"Made available in DSpace on 2017-09-20T16:52:23Z (GMT). No. of bitstreams: 1\nNiaz_grad.sunysb_0771M_12379.pdf: 898920 bytes, checksum: 6fea9a17e2d44edc15ca3afb99c856b2 (MD5)\n Previous issue date: 1"},{"label":"dcterms.publisher","value":"The Graduate School, Stony Brook University: Stony Brook, NY."},{"label":"dcterms.subject","value":"Computer science"},{"label":"dcterms.title","value":"Measuring Routing Policies on the Internet"},{"label":"dcterms.type","value":"Thesis"},{"label":"dc.type","value":"Thesis"}],"description":"This manifest was generated dynamically","viewingDirection":"left-to-right","sequences":[{"@type":"sc:Sequence","canvases":[{"@id":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/canvas/page-1.json","@type":"sc:Canvas","label":"Page 1","height":1650,"width":1275,"images":[{"@type":"oa:Annotation","motivation":"sc:painting","resource":{"@id":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/15%2F13%2F38%2F151338852210653729301736523535318026390/full/full/0/default.jpg","@type":"dctypes:Image","format":"image/jpeg","height":1650,"width":1275,"service":{"@context":"http://iiif.io/api/image/2/context.json","@id":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/15%2F13%2F38%2F151338852210653729301736523535318026390","profile":"http://iiif.io/api/image/2/level2.json"}},"on":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/canvas/page-1.json"}]}]}]}